You are configuring policies for a new deployment. What happens when you set the minimum severity level to 'High'?
AAll alerts are suppressed
BOnly high severity alerts are logged
CMedium and low alerts are ignored
DHigh alerts trigger automatic remediation
Explanation
Setting to 'High' ignores lower severity alerts; the others do not accurately describe the outcome.
Q142
Which service in Symantec Data Center Security provides real-time file integrity monitoring?
AFile Integrity Monitoring
BNetwork Access Control
CDatabase Activity Monitoring
DApplication Control
Explanation
File Integrity Monitoring detects unauthorized changes, the others focus on different aspects of security.
Q143
A company requires log aggregation from their Symantec Data Center Security environment; which feature should they use?
AAnalytics Integration
BEvent Export
CCentralized Management
DReal-time Alerting
Explanation
Event Export allows logs to be sent for aggregation, while others do not specifically aggregate logs.
Q144
You are configuring policy exceptions in Symantec Data Center Security; what happens when a rule is set to 'ignore'?
AAlerts are triggered for violations
BTraffic is blocked entirely
CViolations are logged but not acted on
DAll traffic is allowed without review
Explanation
Setting 'ignore' means violations are logged, but no active measures are taken, other options imply more severe outcomes.
Q145
Which service monitors file integrity in Symantec Data Center Security?
AFile Integrity Monitoring (FIM)
BEndpoint Protection Service
CData Loss Prevention
DNetwork Access Control
Explanation
File Integrity Monitoring (FIM) specifically captures and monitors changes to critical files, while the others cover different security aspects.
Q146
A company needs to enforce security policies across multiple virtual machines. Which approach is most effective?
AImplement VMs in secure mode
BDeploy policies using Virtual Security Groups
CManually configure each VM's firewall
DTurn off network access for all VMs
Explanation
Using Virtual Security Groups allows centralized application of security policies efficiently across numerous VMs.
Q147
What happens when an alert is triggered in Symantec Data Center Security?
AOnly the admin is notified
BAutomatic remediation takes place
CA notification is sent to the SIEM
DThe system ignores the alert
Explanation
Alerts can be configured to send notifications to SIEM systems for tracking, while options A, B, and D are not standard behaviors.
Q148
Which service in VMware Symantec DCS enables real-time security monitoring?
AData Loss Prevention
BIntegrity Monitoring
CSecurity Information and Event Management
DEndpoint Protection
Explanation
Security Information and Event Management provides real-time monitoring, while the others focus on different areas of security.
Q149
A company needs to enforce patch management on all servers. What feature should they use in Symantec DCS?
ANetwork Segmentation
BChange Management
CVulnerability Assessment
DUser Activity Monitoring
Explanation
Vulnerability Assessment identifies missing patches, whereas the others do not relate to patch management.
Q150
You are configuring a security policy. What happens when you set a policy to be in 'Audit' mode?
APrevents all unauthorized actions
BRecords events without blocking them
CEnables automatic remediation
DDisables logging of events
Explanation
Audit mode records events without blocking actions, while the others describe different functionality or incorrect behavior.