VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 131–140 of 195
A company needs to ensure that only specific applications are running on its servers. What is the best approach using Symantec Data Center Security?
-
A
Create a host-based firewall rule
-
B
Use application control policies
-
C
Update antivirus signatures
-
D
Enable full disk encryption
Explanation
Application control policies specify allowed applications, while the other options do not inherently restrict application usage.
You are configuring policies in Symantec Data Center Security. What happens when a policy is set to 'Monitor' rather than 'Block'?
-
A
Activities are completely blocked
-
B
No actions are logged
-
C
Only alerts are generated
-
D
All traffic is allowed through
Explanation
Setting to 'Monitor' generates alerts without blocking, while the other options incorrectly describe the monitoring behavior.
Which service enables file integrity monitoring in Symantec Data Center Security?
-
A
File Integrity Monitoring Service
-
B
Endpoint Protection Manager
-
C
Application Control Service
-
D
Intrusion Detection System
Explanation
File Integrity Monitoring Service tracks file changes while others serve different purposes.
A company needs to secure its virtual machines from malware. Which feature should be enabled?
-
A
Behavior Analysis
-
B
Network Access Control
-
C
Session Management
-
D
Application Control
Explanation
Behavior Analysis detects and blocks malware activity while the others focus on different aspects of security.
You are configuring the compliance dashboard. What happens if you do not define compliance policies?
-
A
No data will be displayed
-
B
Default policies will apply
-
C
All machines are considered compliant
-
D
Reports will show average compliance
Explanation
Without compliance policies, the dashboard cannot present relevant data.
Which service is used for real-time policy enforcement in VMware Data Center Security?
-
A
Policy Server
-
B
Data Protection Engine
-
C
Logging Service
-
D
Threat Intelligence Service
Explanation
The Policy Server provides real-time enforcement, while others perform different functions.
A company needs to prevent unauthorized access to its virtual servers. What solution should it implement?
-
A
Host-Based Intrusion Prevention
-
B
File Integrity Monitoring
-
C
Network Traffic Analysis
-
D
Application Security Testing
Explanation
Host-Based Intrusion Prevention directly protects against unauthorized access.
You are configuring a security policy in VMware Data Center Security. What happens if you set the enforcement mode to 'Audit'?
-
A
Policies are applied to systems
-
B
Violations are reported without blocking
-
C
No reports are generated
-
D
Immediate blocking of violations
Explanation
Audit mode reports violations but does not block them.
Which service in Symantec Data Center Security automatically prevents unauthorized file changes?
-
A
File Integrity Monitoring
-
B
Host Intrusion Prevention
-
C
Application Control
-
D
Behavioral Analysis
Explanation
File Integrity Monitoring detects and prevents unauthorized changes; the other options involve different aspects of security.
A company needs to secure its database servers. What is the most efficient Symantec feature to restrict application execution?
-
A
File Integrity Monitoring
-
B
Application Control
-
C
Network Policy Management
-
D
Data Loss Prevention
Explanation
Application Control restricts unauthorized applications from running, while the others focus on different areas.