VMware

Endpoint Security Complete Implementation – Technical Specialist

250-586

Get certified with the 250-586 exam focusing on Endpoint Security implementations.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 11–20 of 195

Q11

A company needs to enforce device posture checks for compliance. What feature should they implement?

  • A Network Access Control
  • B Load Balancing Engine
  • C Data Replication Service
  • D Desktop Virtualization
Explanation Network Access Control enforces compliance checks, while the other options serve different purposes.
Q12

You are configuring endpoint security policies. What happens when a policy is set to 'Block' for an application?

  • A The application is always allowed.
  • B The application is monitored only.
  • C The application will be blocked.
  • D The policy is ignored.
Explanation Setting 'Block' explicitly prevents the application from running; the other choices misinterpret the policy's function.
Q13

Which service provides adaptive security policies for endpoints?

  • A VMware Carbon Black
  • B VMware vSphere
  • C VMware Workspace ONE
  • D VMware Horizon
Explanation VMware Carbon Black protects endpoints with adaptive policies. The other options do not focus specifically on endpoint security.
Q14

A company needs to restrict USB device access. Which solution should be configured?

  • A Policy-based USB Control
  • B Network segmentation
  • C Endpoint virtualization
  • D Data encryption
Explanation Policy-based USB Control specifically restricts USB access; the other options address different concerns.
Q15

What happens when endpoint detection settings are misconfigured?

  • A Increased performance issues
  • B False security alerts
  • C Reduced threat detection efficacy
  • D Full detection capabilities
Explanation Misconfigured detection settings lead to reduced efficacy in identifying threats; the other options are irrelevant in this context.
Q16

Which service provides data loss prevention in VMware environments?

  • A VMware Carbon Black
  • B VMware vSphere
  • C VMware NSX
  • D VMware Workspace ONE
Explanation VMware Carbon Black offers robust data loss prevention capabilities, while others are focused on virtualization or management.
Q17

A company needs to secure network traffic between virtual machines. What should they implement?

  • A VMware vSAN
  • B VMware NSX
  • C VMware Tools
  • D VMware Horizon
Explanation VMware NSX provides network security features, unlike the other options, which serve different functions.
Q18

What happens when a VM's resource allocation is set to unlimited?

  • A VM will crash immediately
  • B No resource limit for the VM
  • C VM will slow down performance
  • D VM is always prioritized first
Explanation Setting resource allocation to unlimited allows the VM to use resources without restriction; other options misinterpret VM behavior.
Q19

Which service provides advanced threat detection in VMware?

  • A VMware Carbon Black Cloud
  • B VMware vSphere
  • C VMware Workstation
  • D VMware Fusion
Explanation Carbon Black Cloud analyzes endpoint data for threats; the others are not security services.
Q20

A company needs to configure policy-based security for its endpoints. What should they use?

  • A VMware Horizon
  • B VMware Workspace ONE
  • C VMware NSX
  • D VMware Site Recovery
Explanation Workspace ONE integrates endpoint management with security policies; the others don't focus on endpoint policies.