VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 101–110 of 195
A company needs to safeguard sensitive data within virtual environments. What should they enable in Symantec Data Center Security?
-
A
Malware Protection
-
B
Server Hardening
-
C
Visibility Controls
-
D
Virtualization Security
Explanation
Server Hardening specifically addresses securing sensitive data; the other options don't focus exclusively on that.
You are configuring the rule set in Symantec Data Center Security. What happens when a rule is set to 'monitor'?
-
A
Actions are blocked immediately
-
B
Alerts are generated without blocking
-
C
No logging occurs
-
D
Vulnerabilities are auto-fixed
Explanation
Setting a rule to 'monitor' generates alerts without blocking, while the other options do not correctly describe the monitoring behavior.
Which service is responsible for monitoring system changes in Symantec Data Center Security?
-
A
File Integrity Monitoring
-
B
Endpoint Protection
-
C
Incident Response
-
D
Log Management
Explanation
File Integrity Monitoring detects unauthorized changes, while others focus on broader security aspects.
A company needs to secure its high-value servers. Which strategy should they prioritize in Data Center Security?
-
A
User training
-
B
Virtual patching
-
C
Antivirus updates
-
D
Cloud backup
Explanation
Virtual patching protects servers from known vulnerabilities, unlike the other options.
You are configuring policies for a server within Symantec Data Center Security. What happens when policy enforcement is set to 'alert only'?
-
A
Actions will be blocked
-
B
Only notifications will be sent
-
C
No changes will apply
-
D
Policy will be ignored
Explanation
Setting to 'alert only' triggers notifications without enforcement, contrary to blocking or ignoring.
Which service is responsible for monitoring and analyzing security events in Symantec Data Center Security?
-
A
Intrusion Detection Service
-
B
Symantec Security Analytics
-
C
Vulnerability Management Service
-
D
Host Integrity Service
Explanation
Symantec Security Analytics provides event monitoring; others focus on different security functions.
A company needs to ensure compliance with regulatory requirements for its data center. What feature should it prioritize in its security solution?
-
A
Full Disk Encryption
-
B
File Integrity Monitoring
-
C
Virtualization Support
-
D
Performance Optimization
Explanation
File Integrity Monitoring is crucial for compliance; others focus on different aspects.
You are configuring agent policies. If you enable 'Block All' rules, what will the system do?
-
A
Block unauthorized applications only
-
B
Block all applications without exceptions
-
C
Allow all applications
-
D
Block only network traffic
Explanation
'Block All' rules block everything, while others suggest limited control.
Which service offers web application firewall capabilities?
-
A
Symantec Data Center Security
-
B
Endpoint Protection Cloud
-
C
Web Application Firewall Service
-
D
Advanced Threat Protection
Explanation
Web Application Firewall Service provides specific protection for web apps, while other options serve different purposes.
A company needs to control access based on user roles. What configuration do you utilize?
-
A
IP Whitelisting
-
B
Role-Based Access Control
-
C
Time-Based Access Control
-
D
Geo-Location Filtering
Explanation
Role-Based Access Control directly aligns with user roles for access management, unlike other options which focus on different criteria.