A company needs to quarantine a VM exhibiting unusual behavior. What is the first step?
ADisable the VM network
BReinstall the OS
CDelete the VM
DUpdate the AV definitions
Explanation
Disabling the network prevents further harm while isolating the VM for analysis.
Q162
You are configuring DCS for a high-availability setup. What should you ensure?
ASingle point of failure
BLoad balancer configuration
CSame version across nodes
DBackup every hour
Explanation
Having the same version ensures compatibility and reduces downtime in high-availability setups.
Q163
Which service in VMware SDS helps isolate and remediate threats?
AAgent-based scanning
BIntrusion prevention system
COn-demand reporting
DThreat containment service
Explanation
The Threat containment service isolates and remediates threats, while the other options serve different functions.
Q164
A company needs to maintain system integrity and protect against unauthorised access. Which feature should they implement?
AEncryption at rest
BUser access controls
CPatch management
DReal-time monitoring
Explanation
User access controls ensure only authorized access, while other options are important but don't fully address integrity and access protection.
Q165
What happens when firewall rules are misconfigured in VMware Data Center Security?
AComplete system shutdown
BNo traffic filtering occurs
COnly outgoing traffic is blocked
DIncreased logging but no impact
Explanation
Improperly configured rules can lead to no traffic filtering, which increases vulnerability; the other options describe incorrect or inaccurate scenarios.
Q166
Which service provides workload security in SSL environments?
AAdvanced Malware Protection
BWeb Application Firewall
CConnection Broker
DIntegrity Monitoring
Explanation
The Web Application Firewall specifically secures workloads in SSL environments, while other options serve different security functions.
Q167
A company needs to secure virtual machines against unauthorized access. What should be enabled?
AHypervisor Isolation
BGuest OS Firewall
CLocal User Authentication
DVM Encryption
Explanation
VM Encryption secures the virtual machines by preventing unauthorized access, while others focus on different aspects of security.
Q168
You are configuring policies for endpoint protection. What happens when a device is detected as non-compliant?
AIt is automatically reconfigured
BAccess is restricted until compliant
CNo action is taken
DNotification is sent to the administrator
Explanation
Access is typically restricted for non-compliant devices to maintain security, while the other options do not align with standard security protocols.
Q169
Which service does Symantec Data Center Security – Server Advanced provide for monitoring?
AFile integrity monitoring
BNetwork traffic analysis
CEmail filtering
DVirtual machine backup
Explanation
File integrity monitoring is crucial for detecting unauthorized changes, while the others do not pertain to server security directly.
Q170
A company needs to prevent unauthorized processes in their VMs. What feature should they enable?
AApplication control
BFirewall rules
CIntrusion detection system
DDisk encryption
Explanation
Application control restricts unauthorized processes effectively, while the others address different security aspects.