VMware
Endpoint Security Complete Implementation – Technical Specialist
250-586
Get certified with the 250-586 exam focusing on Endpoint Security implementations.
195 questions
0 views
Free
Questions 71–80 of 195
A company needs to enforce data loss prevention on their endpoints. Which feature should they enable?
-
A
Firewall Rules
-
B
Web Filtering
-
C
Endpoint Data Encryption
-
D
Device Control
Explanation
Device Control prevents unauthorized data transfer; others do not specifically address data loss.
You are configuring software updates for a group of endpoints. What happens when a critical update is marked for immediate deployment?
-
A
Clients will ignore the update
-
B
Clients install it at next reboot
-
C
Clients receive it immediately
-
D
Clients get notified but won’t install
Explanation
Marking for immediate deployment forces immediate installation; others delay or ignore the update.
Which service is primarily responsible for endpoint threat intelligence in VMware?
-
A
VMware Carbon Black Cloud
-
B
VMware Horizon
-
C
VMware vSan
-
D
VMware Site Recovery
Explanation
VMware Carbon Black Cloud provides endpoint threat intelligence; the other services do not focus on endpoint security.
A company needs to secure remote employee devices. Which configuration should they implement?
-
A
Deploy endpoint detection and response
-
B
Use only firewall rules
-
C
Rely on antivirus software only
-
D
Disable all remote access
Explanation
Deploying endpoint detection and response best secures remote devices; the others are insufficient alone.
What happens when an unmanaged endpoint accesses a secure network segment?
-
A
Access is granted automatically
-
B
Access results in isolation
-
C
User is authenticated unchanged
-
D
Endpoint's operating system is updated
Explanation
Access typically results in isolation to protect the network; the other options are incorrect access protocols.
Which service in VMware Endpoint Security provides real-time threat detection?
-
A
Threat Analysis and Detection
-
A
Threat Analysis and Detection
-
B
Policy Management
-
C
User Access Logging
-
C
User Access Logging
-
D
Data Encryption
Explanation
Threat Analysis and Detection identifies threats in real-time, while the others serve different purposes.
A company needs to ensure the availability of its virtual desktop infrastructure during hardware failures. What should they implement?
-
A
Single Point of Failure
-
B
High Availability Clustering
-
C
Data Encryption
-
D
Remote Access VPN
Explanation
High Availability Clustering prevents downtime, while the others do not directly address availability.
What happens when a user attempts to access a resource without the necessary endpoint security policies applied?
-
A
Access is granted if credentials are correct
-
B
Access is denied as per security policy
-
C
User will receive a warning notification
-
D
Resource will be automatically unlocked
Explanation
Access is denied if the endpoint security policies are not met, ensuring security compliance.
Which service provides threat detection in VMware environments?
-
A
VMware Carbon Black
-
B
VMware vShield
-
C
VMware NSX
-
D
VMware AppDefense
Explanation
VMware Carbon Black specializes in threat detection and response, while the others focus on different security aspects.
A company needs to secure endpoint data during virtualization. What solution should they implement?
-
A
Data Loss Prevention
-
B
Server Hardening
-
C
Firewall Rules
-
D
Backup Solutions
Explanation
Data Loss Prevention is specifically designed to secure sensitive endpoint data, unlike the other options.