VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 141–150 of 195

Q141

You are configuring policies for a new deployment. What happens when you set the minimum severity level to 'High'?

  • A All alerts are suppressed
  • B Only high severity alerts are logged
  • C Medium and low alerts are ignored
  • D High alerts trigger automatic remediation
Explanation Setting to 'High' ignores lower severity alerts; the others do not accurately describe the outcome.
Q142

Which service in Symantec Data Center Security provides real-time file integrity monitoring?

  • A File Integrity Monitoring
  • B Network Access Control
  • C Database Activity Monitoring
  • D Application Control
Explanation File Integrity Monitoring detects unauthorized changes, the others focus on different aspects of security.
Q143

A company requires log aggregation from their Symantec Data Center Security environment; which feature should they use?

  • A Analytics Integration
  • B Event Export
  • C Centralized Management
  • D Real-time Alerting
Explanation Event Export allows logs to be sent for aggregation, while others do not specifically aggregate logs.
Q144

You are configuring policy exceptions in Symantec Data Center Security; what happens when a rule is set to 'ignore'?

  • A Alerts are triggered for violations
  • B Traffic is blocked entirely
  • C Violations are logged but not acted on
  • D All traffic is allowed without review
Explanation Setting 'ignore' means violations are logged, but no active measures are taken, other options imply more severe outcomes.
Q145

Which service monitors file integrity in Symantec Data Center Security?

  • A File Integrity Monitoring (FIM)
  • B Endpoint Protection Service
  • C Data Loss Prevention
  • D Network Access Control
Explanation File Integrity Monitoring (FIM) specifically captures and monitors changes to critical files, while the others cover different security aspects.
Q146

A company needs to enforce security policies across multiple virtual machines. Which approach is most effective?

  • A Implement VMs in secure mode
  • B Deploy policies using Virtual Security Groups
  • C Manually configure each VM's firewall
  • D Turn off network access for all VMs
Explanation Using Virtual Security Groups allows centralized application of security policies efficiently across numerous VMs.
Q147

What happens when an alert is triggered in Symantec Data Center Security?

  • A Only the admin is notified
  • B Automatic remediation takes place
  • C A notification is sent to the SIEM
  • D The system ignores the alert
Explanation Alerts can be configured to send notifications to SIEM systems for tracking, while options A, B, and D are not standard behaviors.
Q148

Which service in VMware Symantec DCS enables real-time security monitoring?

  • A Data Loss Prevention
  • B Integrity Monitoring
  • C Security Information and Event Management
  • D Endpoint Protection
Explanation Security Information and Event Management provides real-time monitoring, while the others focus on different areas of security.
Q149

A company needs to enforce patch management on all servers. What feature should they use in Symantec DCS?

  • A Network Segmentation
  • B Change Management
  • C Vulnerability Assessment
  • D User Activity Monitoring
Explanation Vulnerability Assessment identifies missing patches, whereas the others do not relate to patch management.
Q150

You are configuring a security policy. What happens when you set a policy to be in 'Audit' mode?

  • A Prevents all unauthorized actions
  • B Records events without blocking them
  • C Enables automatic remediation
  • D Disables logging of events
Explanation Audit mode records events without blocking actions, while the others describe different functionality or incorrect behavior.