Which service in Symantec Data Center Security helps monitor file integrity?
AFile Integrity Monitoring
BNetwork Intrusion Detection
CApplication Control
DMalware Protection
Explanation
File Integrity Monitoring specifically tracks changes to files, while others serve different security roles.
Q152
A company needs to enforce application whitelisting on their servers. What should they configure?
AApplication Control Policies
BFile Integrity Policies
CFirewall Rules
DAnti-Malware Scans
Explanation
Application Control Policies directly manage which applications can run, while others do not enforce whitelisting.
Q153
You are configuring Symantec DCS for a multi-tenant environment. What should you avoid?
AUsing shared policies across tenants
BCreating separate profiles for each tenant
CImplementing tenant isolation measures
DConducting regular tenant reviews
Explanation
Using shared policies can risk cross-tenant data exposure, compromising security, while the other options enhance security.
Q154
Which service provides real-time threat detection in Symantec Data Center Security?
ABehavioral Analysis Service
BStatic Analysis Service
CFile Integrity Monitoring
DVirtual Patch Manager
Explanation
The Behavioral Analysis Service detects threats by monitoring unusual patterns, while the others focus on different aspects of security.
Q155
A company needs to ensure that only certain users can access sensitive files. What is the best approach using Symantec Data Center Security?
ASet up encryption on all files
BImplement role-based access control
CUse a firewall to block access
DInstall antivirus on all servers
Explanation
Role-based access control allows specific user permissions, while the other options do not effectively manage user access rights.
Q156
You are configuring Symantec Data Center Security for a cloud environment. What happens when you enable virtualization awareness?
AIt slows down virtual machines during scans
BIt allows deeper inspection of virtual workloads
CIt disables security for non-virtual servers
DIt removes unnecessary virtual machine files
Explanation
Virtualization awareness enhances threat detection inside virtual machines, while the other options either misrepresent its function or are irrelevant.
Q157
What happens when a security policy is misconfigured in Symantec Data Center Security?
APotential vulnerabilities may be exposed.
BAll systems will automatically shut down.
CSystem performance will significantly increase.
DNetwork traffic will be permanently blocked.
Explanation
Misconfigured policies can open up vulnerabilities, while the other options are incorrect and unlikely outcomes.
Q158
A company needs to implement host-based intrusion detection but also minimize performance impact. Which feature should they enable?
AReal-time monitoring only.
BBehavioral analysis module.
CNetwork-level scanning only.
DEnd-user activity reporting.
Explanation
Behavioral analysis can detect intrusions while maintaining performance, unlike the other options which either don't relate or are limited in scope.
Q159
You are configuring the Data Center Security – Server Advanced policy settings. Which setting is critical for application whitelisting?
ABlock all unknown applications.
BAllow all applications by default.
CCreate a comprehensive whitelist.
DDisable application control.
Explanation
Creating a comprehensive whitelist is essential for application whitelisting, while the other options contradict the purpose of this feature.
Q160
Which service is used to enforce policies on VMs?
AData Center Security Agent
BSymantec Endpoint Protection
CVirtual Machine Manager
DApplication Control Service
Explanation
Data Center Security Agent enforces security policies, while others serve different functions.