You are configuring rules for a virtual machine firewall in Symantec Data Center Security. What happens when a rule is defined with 'Deny All Traffic'?
APermits all inbound traffic
BBlocks all outbound traffic
CAllows only authorized but monitored traffic
DBlocks all network traffic
Explanation
'Deny All Traffic' completely blocks network access, while others present different outcomes.
Q127
Which service is primarily responsible for managing vulnerability assessments in Symantec DCS?
AVulnerability Management
BEndpoint Protection
CPolicy Enforcement
DNetwork Monitoring
Explanation
Vulnerability Management handles assessments, while others manage different aspects of security.
Q128
A company needs to report on security incidents. What component of Symantec DCS enables this feature?
AData Loss Prevention
BAudit Logging
CSecurity Information Management
DIntrusion Prevention
Explanation
Security Information Management aggregates security incidents for reporting, while others focus on prevention or protection.
Q129
You are configuring a policy to prevent data exfiltration. What happens when a user tries to send restricted files?
AThe files are encrypted automatically
BAccess is denied based on policy
CFiles are sent with a warning
DFiles are copied to a secure server
Explanation
Access is denied based on policy settings, ensuring compliance with data protection.
Q130
Which service is primarily responsible for managing server vulnerabilities in Symantec Data Center Security?
AVulnerability Management
BIntrusion Prevention
CFile Integrity Monitoring
DPolicy Enforcement
Explanation
Vulnerability Management identifies and mitigates server vulnerabilities, while the others focus on different aspects of security.