VMware

Endpoint Security Complete Implementation – Technical Specialist

250-586

Get certified with the 250-586 exam focusing on Endpoint Security implementations.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 171–180 of 195

Q171

You are configuring security policies in VMware Carbon Black. What happens when you set a high sensitivity for alerts?

  • A Fewer alerts generated
  • B More benign alerts
  • C Critical threats ignored
  • D Real incidents prioritized
Explanation High sensitivity often results in increased benign alerts due to heightened detection, whereas low sensitivity can overlook real incidents.
Q172

Which service is responsible for real-time endpoint threat detection in VMware Endpoint Security?

  • A Threat Intelligence
  • B Vulnerability Assessment
  • C Behavioral Analysis
  • D Data Encryption
Explanation Behavioral Analysis detects anomalies in real-time, unlike the other services listed.
Q173

A company needs to configure application whitelisting. Which VMware feature should they use?

  • A Application Control
  • B Firewall Rules
  • C Endpoint Isolation
  • D Network Segmentation
Explanation Application Control allows administrators to define approved applications specifically.
Q174

What happens when a policy is not applied to a managed endpoint in VMware Security?

  • A Endpoint runs on default settings
  • B Endpoint becomes permanently isolated
  • C Endpoint loses network access
  • D Endpoint not detectable by system
Explanation Without a policy, the endpoint defaults to standard configurations.
Q175

Which service primarily protects against web traffic threats?

  • A Web Application Firewall (WAF)
  • B Virtual Private Network (VPN)
  • C Data Loss Prevention (DLP)
  • D Endpoint Protection Platform (EPP)
Explanation A WAF specifically filters web traffic threats, while VPN encrypts internet connections.
Q176

A company needs to enforce endpoint compliance policies. Which VMware solution should they use?

  • A VMware Carbon Black
  • B VMware Horizon
  • C VMware vSphere
  • D VMware NSX
Explanation VMware Carbon Black is designed to enforce compliance and security policies for endpoints.
Q177

What happens when a threat is detected in the network?

  • A Nothing, it is logged.
  • B An alert is triggered.
  • C All traffic is immediately blocked.
  • D User must manually respond.
Explanation When a threat is detected, typically an alert is triggered to notify administrators.
Q178

Which service is responsible for enforcing security policies on VMware endpoints?

  • A VMware Carbon Black Cloud
  • B VMware vSphere
  • C VMware Horizon
  • D VMware NSX
Explanation VMware Carbon Black Cloud enforces security policies, while the others do not focus on endpoint security.
Q179

A company needs to secure its virtual desktop infrastructure (VDI). Which feature should it implement to ensure only authorized users can access their sessions?

  • A Single Sign-On (SSO)
  • B Two-Factor Authentication (2FA)
  • C Session Timeouts
  • D Network Segmentation
Explanation Two-Factor Authentication (2FA) enhances access security significantly over other options.
Q180

You are configuring VMware Endpoint Security for a distributed environment. What happens when policy conflicts arise across the endpoints?

  • A Only the most restrictive policy applies
  • B No policy is enforced
  • C The last policy applied takes precedence
  • D An alert is generated without enforcement
Explanation In case of conflicts, only the most restrictive policy applies to ensure enhanced security.