VMware

Endpoint Security Complete Implementation – Technical Specialist

250-586

Get certified with the 250-586 exam focusing on Endpoint Security implementations.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 71–80 of 195

Q71

A company needs to enforce data loss prevention on their endpoints. Which feature should they enable?

  • A Firewall Rules
  • B Web Filtering
  • C Endpoint Data Encryption
  • D Device Control
Explanation Device Control prevents unauthorized data transfer; others do not specifically address data loss.
Q72

You are configuring software updates for a group of endpoints. What happens when a critical update is marked for immediate deployment?

  • A Clients will ignore the update
  • B Clients install it at next reboot
  • C Clients receive it immediately
  • D Clients get notified but won’t install
Explanation Marking for immediate deployment forces immediate installation; others delay or ignore the update.
Q73

Which service is primarily responsible for endpoint threat intelligence in VMware?

  • A VMware Carbon Black Cloud
  • B VMware Horizon
  • C VMware vSan
  • D VMware Site Recovery
Explanation VMware Carbon Black Cloud provides endpoint threat intelligence; the other services do not focus on endpoint security.
Q74

A company needs to secure remote employee devices. Which configuration should they implement?

  • A Deploy endpoint detection and response
  • B Use only firewall rules
  • C Rely on antivirus software only
  • D Disable all remote access
Explanation Deploying endpoint detection and response best secures remote devices; the others are insufficient alone.
Q75

What happens when an unmanaged endpoint accesses a secure network segment?

  • A Access is granted automatically
  • B Access results in isolation
  • C User is authenticated unchanged
  • D Endpoint's operating system is updated
Explanation Access typically results in isolation to protect the network; the other options are incorrect access protocols.
Q76

Which service in VMware Endpoint Security provides real-time threat detection?

  • A Threat Analysis and Detection
  • A Threat Analysis and Detection
  • B Policy Management
  • C User Access Logging
  • C User Access Logging
  • D Data Encryption
Explanation Threat Analysis and Detection identifies threats in real-time, while the others serve different purposes.
Q77

A company needs to ensure the availability of its virtual desktop infrastructure during hardware failures. What should they implement?

  • A Single Point of Failure
  • B High Availability Clustering
  • C Data Encryption
  • D Remote Access VPN
Explanation High Availability Clustering prevents downtime, while the others do not directly address availability.
Q78

What happens when a user attempts to access a resource without the necessary endpoint security policies applied?

  • A Access is granted if credentials are correct
  • B Access is denied as per security policy
  • C User will receive a warning notification
  • D Resource will be automatically unlocked
Explanation Access is denied if the endpoint security policies are not met, ensuring security compliance.
Q79

Which service provides threat detection in VMware environments?

  • A VMware Carbon Black
  • B VMware vShield
  • C VMware NSX
  • D VMware AppDefense
Explanation VMware Carbon Black specializes in threat detection and response, while the others focus on different security aspects.
Q80

A company needs to secure endpoint data during virtualization. What solution should they implement?

  • A Data Loss Prevention
  • B Server Hardening
  • C Firewall Rules
  • D Backup Solutions
Explanation Data Loss Prevention is specifically designed to secure sensitive endpoint data, unlike the other options.