VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 91–100 of 195

Q91

Which service allows for securing sensitive data at rest?

  • A Data Loss Prevention (DLP)
  • B Network Firewall
  • C Endpoint Protection
  • D Intrusion Detection System (IDS)
Explanation DLP focuses specifically on securing sensitive data, while others do not.
Q92

A company needs to ensure no unauthorized access to sensitive files. What is the best approach?

  • A Use strong passwords only
  • B Implement role-based access control
  • C Encrypt all files only
  • D Regularly change network switches
Explanation Role-based access control prevents unauthorized access effectively, unlike the other options.
Q93

You are configuring security settings for a virtual machine. What happens when you enable application whitelisting?

  • A All applications are blocked
  • B Only approved applications can run
  • C No changes are allowed to VM
  • D System performance is negatively impacted
Explanation Application whitelisting allows only approved applications to run, enhancing security.
Q94

Which service provides monitoring in Symantec Data Center Security?

  • A Event Management
  • B File Integrity Monitoring
  • C Anti-Malware Protection
  • D Network Security
Explanation File Integrity Monitoring tracks changes to files, ensuring compliance and security, unlike other options that serve different purposes.
Q95

A company needs to secure its critical servers. What should they prioritize?

  • A User training
  • B Regular backups
  • C Centralized logging
  • D Patch management
Explanation Patch management directly addresses vulnerabilities, making it essential for securing servers over the other choices.
Q96

You are configuring server policies. What happens when a server is deemed non-compliant?

  • A It is automatically quarantined
  • B Alerts are generated
  • C No action is taken
  • D Service level is increased
Explanation Alerts are generated to notify administrators of non-compliance, instead of automatically quarantining or ignoring the issue.
Q97

Which service provides real-time integrity monitoring?

  • A File Integrity Monitoring
  • B Network Traffic Analysis
  • C Patch Management
  • D Vulnerability Scanning
Explanation File Integrity Monitoring detects unauthorized changes, while others focus on different security aspects.
Q98

A company needs to comply with PCI DSS regulations. What feature should they prioritize in their DS solution?

  • A Firewall Configuration
  • B Data Encryption
  • C Application Whitelisting
  • D User Activity Logging
Explanation Application Whitelisting prevents unauthorized software, key for PCI DSS compliance, unlike others that support broader security objectives.
Q99

You are configuring policy parameters for your server environment. What happens when you set the 'enforcement level' to 'monitor'?

  • A Policies are not enforced.
  • B All alerts are ignored.
  • C Violations are logged only.
  • D True enforcement occurs.
Explanation 'Monitor' mode logs violations without enforcing policy, unlike 'enforcement' which actively blocks actions.
Q100

Which service provides real-time threat intelligence in Symantec Data Center Security?

  • A Symantec Global Intelligence Network
  • B Data Loss Prevention
  • C Endpoint Protection
  • D Advanced Threat Protection
Explanation The Symantec Global Intelligence Network offers real-time threat intelligence; the others serve different purposes.