VMware
Endpoint Security Complete Implementation – Technical Specialist
250-586
Get certified with the 250-586 exam focusing on Endpoint Security implementations.
195 questions
0 views
Free
Questions 11–20 of 195
A company needs to enforce device posture checks for compliance. What feature should they implement?
-
A
Network Access Control
-
B
Load Balancing Engine
-
C
Data Replication Service
-
D
Desktop Virtualization
Explanation
Network Access Control enforces compliance checks, while the other options serve different purposes.
You are configuring endpoint security policies. What happens when a policy is set to 'Block' for an application?
-
A
The application is always allowed.
-
B
The application is monitored only.
-
C
The application will be blocked.
-
D
The policy is ignored.
Explanation
Setting 'Block' explicitly prevents the application from running; the other choices misinterpret the policy's function.
Which service provides adaptive security policies for endpoints?
-
A
VMware Carbon Black
-
B
VMware vSphere
-
C
VMware Workspace ONE
-
D
VMware Horizon
Explanation
VMware Carbon Black protects endpoints with adaptive policies. The other options do not focus specifically on endpoint security.
A company needs to restrict USB device access. Which solution should be configured?
-
A
Policy-based USB Control
-
B
Network segmentation
-
C
Endpoint virtualization
-
D
Data encryption
Explanation
Policy-based USB Control specifically restricts USB access; the other options address different concerns.
What happens when endpoint detection settings are misconfigured?
-
A
Increased performance issues
-
B
False security alerts
-
C
Reduced threat detection efficacy
-
D
Full detection capabilities
Explanation
Misconfigured detection settings lead to reduced efficacy in identifying threats; the other options are irrelevant in this context.
Which service provides data loss prevention in VMware environments?
-
A
VMware Carbon Black
-
B
VMware vSphere
-
C
VMware NSX
-
D
VMware Workspace ONE
Explanation
VMware Carbon Black offers robust data loss prevention capabilities, while others are focused on virtualization or management.
A company needs to secure network traffic between virtual machines. What should they implement?
-
A
VMware vSAN
-
B
VMware NSX
-
C
VMware Tools
-
D
VMware Horizon
Explanation
VMware NSX provides network security features, unlike the other options, which serve different functions.
What happens when a VM's resource allocation is set to unlimited?
-
A
VM will crash immediately
-
B
No resource limit for the VM
-
C
VM will slow down performance
-
D
VM is always prioritized first
Explanation
Setting resource allocation to unlimited allows the VM to use resources without restriction; other options misinterpret VM behavior.
Which service provides advanced threat detection in VMware?
-
A
VMware Carbon Black Cloud
-
B
VMware vSphere
-
C
VMware Workstation
-
D
VMware Fusion
Explanation
Carbon Black Cloud analyzes endpoint data for threats; the others are not security services.
A company needs to configure policy-based security for its endpoints. What should they use?
-
A
VMware Horizon
-
B
VMware Workspace ONE
-
C
VMware NSX
-
D
VMware Site Recovery
Explanation
Workspace ONE integrates endpoint management with security policies; the others don't focus on endpoint policies.