VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 121–130 of 195

Q121

Which service provides host-based intrusion prevention?

  • A Symantec Data Center Security
  • B VCenter Server
  • C VMware NSX
  • D VMware Horizon
Explanation Symantec Data Center Security offers host-based intrusion prevention, while the others do not provide this functionality.
Q122

A company needs to limit access to sensitive applications. What should they implement?

  • A Network access controls
  • B Backup software
  • C Load balancing
  • D Patch management
Explanation Network access controls effectively restrict access to sensitive applications, unlike the other options.
Q123

You are configuring Agent Management in Symantec DCS. What happens when untrusted folders are monitored?

  • A Block all files immediately
  • B Generate alerts only
  • C Verify user permissions
  • D Review for suspicious activity
Explanation Monitoring untrusted folders allows for reviewing suspicious activity rather than blocking or verifying permissions.
Q124

Which service is primarily responsible for host integrity checks in Symantec Data Center Security?

  • A Integrity Monitoring
  • B Policy Enforcement
  • C File Integrity
  • D Vulnerability Assessment
Explanation Integrity Monitoring checks host integrity, while others serve different purposes.
Q125

A company needs to restrict application execution based on risk levels. What mechanism should they use?

  • A Application Control Policies
  • B Network Segmentation
  • C User Control Policies
  • D Backup Policies
Explanation Application Control Policies prevent unauthorized applications, whereas others don't address application execution.
Q126

You are configuring rules for a virtual machine firewall in Symantec Data Center Security. What happens when a rule is defined with 'Deny All Traffic'?

  • A Permits all inbound traffic
  • B Blocks all outbound traffic
  • C Allows only authorized but monitored traffic
  • D Blocks all network traffic
Explanation 'Deny All Traffic' completely blocks network access, while others present different outcomes.
Q127

Which service is primarily responsible for managing vulnerability assessments in Symantec DCS?

  • A Vulnerability Management
  • B Endpoint Protection
  • C Policy Enforcement
  • D Network Monitoring
Explanation Vulnerability Management handles assessments, while others manage different aspects of security.
Q128

A company needs to report on security incidents. What component of Symantec DCS enables this feature?

  • A Data Loss Prevention
  • B Audit Logging
  • C Security Information Management
  • D Intrusion Prevention
Explanation Security Information Management aggregates security incidents for reporting, while others focus on prevention or protection.
Q129

You are configuring a policy to prevent data exfiltration. What happens when a user tries to send restricted files?

  • A The files are encrypted automatically
  • B Access is denied based on policy
  • C Files are sent with a warning
  • D Files are copied to a secure server
Explanation Access is denied based on policy settings, ensuring compliance with data protection.
Q130

Which service is primarily responsible for managing server vulnerabilities in Symantec Data Center Security?

  • A Vulnerability Management
  • B Intrusion Prevention
  • C File Integrity Monitoring
  • D Policy Enforcement
Explanation Vulnerability Management identifies and mitigates server vulnerabilities, while the others focus on different aspects of security.