VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 91–100 of 195
Which service allows for securing sensitive data at rest?
-
A
Data Loss Prevention (DLP)
-
B
Network Firewall
-
C
Endpoint Protection
-
D
Intrusion Detection System (IDS)
Explanation
DLP focuses specifically on securing sensitive data, while others do not.
A company needs to ensure no unauthorized access to sensitive files. What is the best approach?
-
A
Use strong passwords only
-
B
Implement role-based access control
-
C
Encrypt all files only
-
D
Regularly change network switches
Explanation
Role-based access control prevents unauthorized access effectively, unlike the other options.
You are configuring security settings for a virtual machine. What happens when you enable application whitelisting?
-
A
All applications are blocked
-
B
Only approved applications can run
-
C
No changes are allowed to VM
-
D
System performance is negatively impacted
Explanation
Application whitelisting allows only approved applications to run, enhancing security.
Which service provides monitoring in Symantec Data Center Security?
-
A
Event Management
-
B
File Integrity Monitoring
-
C
Anti-Malware Protection
-
D
Network Security
Explanation
File Integrity Monitoring tracks changes to files, ensuring compliance and security, unlike other options that serve different purposes.
A company needs to secure its critical servers. What should they prioritize?
-
A
User training
-
B
Regular backups
-
C
Centralized logging
-
D
Patch management
Explanation
Patch management directly addresses vulnerabilities, making it essential for securing servers over the other choices.
You are configuring server policies. What happens when a server is deemed non-compliant?
-
A
It is automatically quarantined
-
B
Alerts are generated
-
C
No action is taken
-
D
Service level is increased
Explanation
Alerts are generated to notify administrators of non-compliance, instead of automatically quarantining or ignoring the issue.
Which service provides real-time integrity monitoring?
-
A
File Integrity Monitoring
-
B
Network Traffic Analysis
-
C
Patch Management
-
D
Vulnerability Scanning
Explanation
File Integrity Monitoring detects unauthorized changes, while others focus on different security aspects.
A company needs to comply with PCI DSS regulations. What feature should they prioritize in their DS solution?
-
A
Firewall Configuration
-
B
Data Encryption
-
C
Application Whitelisting
-
D
User Activity Logging
Explanation
Application Whitelisting prevents unauthorized software, key for PCI DSS compliance, unlike others that support broader security objectives.
You are configuring policy parameters for your server environment. What happens when you set the 'enforcement level' to 'monitor'?
-
A
Policies are not enforced.
-
B
All alerts are ignored.
-
C
Violations are logged only.
-
D
True enforcement occurs.
Explanation
'Monitor' mode logs violations without enforcing policy, unlike 'enforcement' which actively blocks actions.
Which service provides real-time threat intelligence in Symantec Data Center Security?
-
A
Symantec Global Intelligence Network
-
B
Data Loss Prevention
-
C
Endpoint Protection
-
D
Advanced Threat Protection
Explanation
The Symantec Global Intelligence Network offers real-time threat intelligence; the others serve different purposes.