VMware

Endpoint Security Complete Implementation – Technical Specialist

250-586

Get certified with the 250-586 exam focusing on Endpoint Security implementations.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 141–150 of 195

Q141

You are configuring a policy in VMware Carbon Black. What happens when you set the 'detect only' mode for threats?

  • A Threats are blocked immediately.
  • B Alerts are generated for later review.
  • C No notifications will be sent.
  • D All threats are quarantined.
Explanation 'Detect only' mode generates alerts without taking action against threats, unlike blocking and quarantining options.
Q142

Which service provides malware detection in VMware security setup?

  • A VMware Carbon Black
  • B VMware vSphere
  • C VMware NSX
  • D VMware vSAN
Explanation VMware Carbon Black is designed for malware detection, while the others serve different purposes.
Q143

A company needs to enforce endpoint compliance in a hybrid environment. What should they utilize?

  • A VMware Workspace ONE
  • B VMware Site Recovery
  • C VMware vCloud Director
  • D VMware vRealize Operations
Explanation VMware Workspace ONE provides compliance management, unlike the other options.
Q144

You are configuring security policies in VMware. What happens when conflicting policies apply to the same endpoint?

  • A The endpoint ignores all policies
  • B Highest priority policy takes effect
  • C Random policy is applied
  • D All policies merge into one
Explanation The highest priority policy will be applied, as VMware security systems prioritize policies based on their settings.
Q145

Which service helps secure virtual endpoints in VMware?

  • A VMware Carbon Black
  • B VMware vSphere
  • C VMware NSX
  • D VMware Workstation
Explanation VMware Carbon Black provides endpoint security, while others serve different functions.
Q146

A company needs to enhance its endpoint security against malware. What should it implement?

  • A Intrusion Detection Systems
  • B VMware Endpoint Security Complete
  • C Data Backup Solutions
  • D Social Engineering Training
Explanation VMware Endpoint Security Complete specifically targets enhanced endpoint security, unlike the other options.
Q147

You are configuring policies in VMware Endpoint Security. What happens when a device is non-compliant?

  • A It remains operational but limited
  • B It is automatically formatted
  • C It gets network access immediately
  • D It triggers a security alert
Explanation A non-compliant device may be limited in functionality, rather than being formatted or gaining immediate access.
Q148

Which service in VMware helps to automate compliance checks?

  • A VMware vRealize Automation
  • B VMware Horizon
  • C VMware NSX
  • D VMware Workspace ONE
Explanation VMware vRealize Automation automates compliance checks; the others focus on different functionalities.
Q149

You are configuring a VDI environment for a business. What is critical to ensure optimal performance?

  • A Unlimited storage for users
  • B Low latency network connection
  • C High CPU clock speed only
  • D Single data center location
Explanation A low latency network connection is critical for VDI performance; the other options do not solely ensure optimal performance.
Q150

What happens when a user device becomes compromised in a VMware environment?

  • A It gets automatically isolated
  • B All data is deleted immediately
  • C It can still access internal resources
  • D Security policies remain unchanged
Explanation Compromised devices are typically isolated to protect resources; the other options incorrectly suggest lack of protective measures.