VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 161–170 of 195

Q161

A company needs to quarantine a VM exhibiting unusual behavior. What is the first step?

  • A Disable the VM network
  • B Reinstall the OS
  • C Delete the VM
  • D Update the AV definitions
Explanation Disabling the network prevents further harm while isolating the VM for analysis.
Q162

You are configuring DCS for a high-availability setup. What should you ensure?

  • A Single point of failure
  • B Load balancer configuration
  • C Same version across nodes
  • D Backup every hour
Explanation Having the same version ensures compatibility and reduces downtime in high-availability setups.
Q163

Which service in VMware SDS helps isolate and remediate threats?

  • A Agent-based scanning
  • B Intrusion prevention system
  • C On-demand reporting
  • D Threat containment service
Explanation The Threat containment service isolates and remediates threats, while the other options serve different functions.
Q164

A company needs to maintain system integrity and protect against unauthorised access. Which feature should they implement?

  • A Encryption at rest
  • B User access controls
  • C Patch management
  • D Real-time monitoring
Explanation User access controls ensure only authorized access, while other options are important but don't fully address integrity and access protection.
Q165

What happens when firewall rules are misconfigured in VMware Data Center Security?

  • A Complete system shutdown
  • B No traffic filtering occurs
  • C Only outgoing traffic is blocked
  • D Increased logging but no impact
Explanation Improperly configured rules can lead to no traffic filtering, which increases vulnerability; the other options describe incorrect or inaccurate scenarios.
Q166

Which service provides workload security in SSL environments?

  • A Advanced Malware Protection
  • B Web Application Firewall
  • C Connection Broker
  • D Integrity Monitoring
Explanation The Web Application Firewall specifically secures workloads in SSL environments, while other options serve different security functions.
Q167

A company needs to secure virtual machines against unauthorized access. What should be enabled?

  • A Hypervisor Isolation
  • B Guest OS Firewall
  • C Local User Authentication
  • D VM Encryption
Explanation VM Encryption secures the virtual machines by preventing unauthorized access, while others focus on different aspects of security.
Q168

You are configuring policies for endpoint protection. What happens when a device is detected as non-compliant?

  • A It is automatically reconfigured
  • B Access is restricted until compliant
  • C No action is taken
  • D Notification is sent to the administrator
Explanation Access is typically restricted for non-compliant devices to maintain security, while the other options do not align with standard security protocols.
Q169

Which service does Symantec Data Center Security – Server Advanced provide for monitoring?

  • A File integrity monitoring
  • B Network traffic analysis
  • C Email filtering
  • D Virtual machine backup
Explanation File integrity monitoring is crucial for detecting unauthorized changes, while the others do not pertain to server security directly.
Q170

A company needs to prevent unauthorized processes in their VMs. What feature should they enable?

  • A Application control
  • B Firewall rules
  • C Intrusion detection system
  • D Disk encryption
Explanation Application control restricts unauthorized processes effectively, while the others address different security aspects.