VMware

Privileged Access Management Technical Specialist

250-572

Prepare for the 250-572 exam to demonstrate your skills in Privileged Access Management.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 195

Q131

A company needs to manage explicit access to virtual machines for sensitive tasks. What is the best method to implement this?

  • A Use Role-Based Access Control (RBAC)
  • B Assign permissions via local users
  • C Employ firewall rules
  • D Disable user accounts temporarily
Explanation RBAC allows precise control over user permissions unlike the other options that provide less targeted access management.
Q132

You are configuring a VMware environment. What happens when a user is assigned the 'No Access' role?

  • A User retains read permissions
  • B User cannot view or interact
  • C User can only log in
  • D User has full admin access
Explanation 'No Access' revokes all permissions, meaning the user can't view or interact with resources.
Q133

Which service provides auditing and compliance in VMware PAM?

  • A VMware vRealize Log Insight
  • B VMware Site Recovery Manager
  • C VMware NSX-T Data Center
  • D VMware vSphere Replication
Explanation VMware vRealize Log Insight delivers comprehensive audit and compliance capabilities, while the other options serve different purposes.
Q134

A company needs to automate access approval for sensitive systems. Which feature in VMware PAM should they use?

  • A Self-Service Portal
  • B Access Policies
  • C Audit Logs
  • D Role-Based Access Control
Explanation Access Policies facilitate automated access approvals, whereas the other options either provide insights or do not automate the process.
Q135

What happens when a user attempts to access a system without proper authorization in VMware PAM?

  • A Access is granted immediately
  • B Access logs are created only
  • C Access request is denied
  • D User is automatically notified
Explanation Access requests without proper authorization are denied, while the other options imply either permitting unauthorized access or insufficient actions.
Q136

Which service enables automated management of access rights?

  • A VMware Identity Manager
  • B VMware vRealize Automation
  • C VMware Horizon Workspace
  • D VMware Cloud Director
Explanation VMware Identity Manager provides automated access rights management while others focus on different functionalities.
Q137

A company needs to monitor user activity across various VMware resources. What tool should they use?

  • A VMware Workspace ONE
  • B VMware Log Insight
  • C VMware NSX
  • D VMware vSphere Client
Explanation VMware Log Insight gives in-depth user activity monitoring; the others are not primarily designed for this purpose.
Q138

What happens when a user is removed from a PAM role in VMware?

  • A Immediate loss of all access
  • B Access remains until session ends
  • C Only access to non-privileged roles lost
  • D They regain full access default settings
Explanation Access remains until the current session ends; options A, C, and D misrepresent access behavior after role removal.
Q139

Which service is primarily responsible for managing user permissions in VMware Privileged Access Management?

  • A Identity Manager
  • B Certificate Authority
  • C Virtual SAN
  • D vSphere Client
Explanation Identity Manager manages user permissions, while others are for different tasks.
Q140

A company needs to grant temporary access to a third-party vendor. What feature in VMware PAM should they use?

  • A Role Assignment
  • B Session Management
  • C Access Policy
  • D Time-Limited Access
Explanation Time-Limited Access allows for temporary permissions, which is essential for vendor access.