You are configuring a security policy. What happens when you set it to 'Audit Mode'?
ABlocks malicious activities
BLogs activities without blocking
CAlerts without logging
DImmediately terminates connections
Explanation
'Audit Mode' monitors and logs potential threats without enforcing blocking actions, distinguishing it from blocking options.
Q112
Which service in Symantec Data Center Security enforces policy compliance?
AEnforcement Service
BAudit Service
CDiscovery Service
DMonitoring Service
Explanation
The Enforcement Service actively enforces security policies, while others monitor or discover.
Q113
A company needs to monitor file integrity in a virtual environment. What feature should they enable?
AFile Integrity Monitoring
BProcess Isolation
CNetwork Segmentation
DApplication Whitelisting
Explanation
File Integrity Monitoring specifically tracks changes to files.
Q114
You are configuring integration with an SIEM tool. What does the event forwarding setting control?
ARate of data transfer
BFormat of event data
CFrequency of logs sent
DConnectivity to the SIEM server
Explanation
The event forwarding setting determines how event data is formatted.
Q115
Which service in Symantec DCS enables real-time malware scanning?
AFile Integrity Monitoring
BEndpoint Protection Services
CBehavioral Analysis
DLog Management
Explanation
Endpoint Protection Services conduct real-time malware scans, unlike the other options.
Q116
A company needs to restrict access to sensitive files on their servers. What should they implement?
AData Loss Prevention policies
BSSL encryption
CNetwork segmentation
DBackup schedules
Explanation
Data Loss Prevention policies specifically target access control for sensitive files, while the others focus on different aspects of security.
Q117
What happens when you enable high-assurance mode in Symantec DCS?
AProvides enhanced user experience
BLocks down critical system files
CIncreases data transfer speed
DDisables all network traffic
Explanation
High-assurance mode locks down critical system files to prevent unauthorized access, while the other options provide unrelated functions.
Q118
Which service leverages agent technology for real-time monitoring of servers?
AEndpoint Protection
BThreat Protection
CData Loss Prevention
DFile Integrity Monitoring
Explanation
Endpoint Protection uses agents to monitor servers, while others focus on different security aspects.
Q119
A company needs to ensure compliance with data privacy regulations. What should be prioritized?
ARegular software updates
BIncident response plans
CData encryption and access controls
DEmployee training sessions
Explanation
Data encryption and access controls are critical for compliance, unlike other options that address different concerns.
Q120
You are configuring a policy to block unauthorized software installation. What happens if you set it to 'audit' mode?
ABlocks all unauthorized software
BRecords violations without blocking
CAllows all software installs
DDeletes unauthorized software automatically
Explanation
Audit mode records actions instead of blocking, while the others suggest corrective actions that won't occur.