VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 195

Q131

A company needs to ensure that only specific applications are running on its servers. What is the best approach using Symantec Data Center Security?

  • A Create a host-based firewall rule
  • B Use application control policies
  • C Update antivirus signatures
  • D Enable full disk encryption
Explanation Application control policies specify allowed applications, while the other options do not inherently restrict application usage.
Q132

You are configuring policies in Symantec Data Center Security. What happens when a policy is set to 'Monitor' rather than 'Block'?

  • A Activities are completely blocked
  • B No actions are logged
  • C Only alerts are generated
  • D All traffic is allowed through
Explanation Setting to 'Monitor' generates alerts without blocking, while the other options incorrectly describe the monitoring behavior.
Q133

Which service enables file integrity monitoring in Symantec Data Center Security?

  • A File Integrity Monitoring Service
  • B Endpoint Protection Manager
  • C Application Control Service
  • D Intrusion Detection System
Explanation File Integrity Monitoring Service tracks file changes while others serve different purposes.
Q134

A company needs to secure its virtual machines from malware. Which feature should be enabled?

  • A Behavior Analysis
  • B Network Access Control
  • C Session Management
  • D Application Control
Explanation Behavior Analysis detects and blocks malware activity while the others focus on different aspects of security.
Q135

You are configuring the compliance dashboard. What happens if you do not define compliance policies?

  • A No data will be displayed
  • B Default policies will apply
  • C All machines are considered compliant
  • D Reports will show average compliance
Explanation Without compliance policies, the dashboard cannot present relevant data.
Q136

Which service is used for real-time policy enforcement in VMware Data Center Security?

  • A Policy Server
  • B Data Protection Engine
  • C Logging Service
  • D Threat Intelligence Service
Explanation The Policy Server provides real-time enforcement, while others perform different functions.
Q137

A company needs to prevent unauthorized access to its virtual servers. What solution should it implement?

  • A Host-Based Intrusion Prevention
  • B File Integrity Monitoring
  • C Network Traffic Analysis
  • D Application Security Testing
Explanation Host-Based Intrusion Prevention directly protects against unauthorized access.
Q138

You are configuring a security policy in VMware Data Center Security. What happens if you set the enforcement mode to 'Audit'?

  • A Policies are applied to systems
  • B Violations are reported without blocking
  • C No reports are generated
  • D Immediate blocking of violations
Explanation Audit mode reports violations but does not block them.
Q139

Which service in Symantec Data Center Security automatically prevents unauthorized file changes?

  • A File Integrity Monitoring
  • B Host Intrusion Prevention
  • C Application Control
  • D Behavioral Analysis
Explanation File Integrity Monitoring detects and prevents unauthorized changes; the other options involve different aspects of security.
Q140

A company needs to secure its database servers. What is the most efficient Symantec feature to restrict application execution?

  • A File Integrity Monitoring
  • B Application Control
  • C Network Policy Management
  • D Data Loss Prevention
Explanation Application Control restricts unauthorized applications from running, while the others focus on different areas.