VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 171–180 of 195
You are configuring agent deployment. What happens when the deployment fails?
-
A
Agents remain inactive
-
B
The server is compromised
-
C
Performance is unaffected
-
D
All mounted drives are deleted
Explanation
If the agent deployment fails, the agents will remain inactive, without compromising the server or impacting performance.
Which service does Symantec Data Center Security use for agent communication?
-
A
Management Server
-
B
Database Server
-
C
Web Application
-
D
Load Balancer
Explanation
The Management Server handles agent communication, not the other options.
A company needs to restrict unauthorized file access. Which feature should they implement?
-
A
File Integrity Monitoring
-
B
Network Control
-
C
Virtual Patch Management
-
D
Application Control
Explanation
File Integrity Monitoring tracks unauthorized access to files, unlike other features listed.
What happens when you disable an agent in Symantec Data Center Security?
-
A
Agent stops running completely.
-
B
Agent resumes with default settings.
-
C
Agent continues to monitor events.
-
D
No impact on agent policies.
Explanation
Disabling an agent stops all operations, unlike options B, C, and D.
Which service primarily helps to monitor vulnerabilities in real-time?
-
A
Data Center Protection
-
B
Vulnerability Assessment
-
C
Compliance Management
-
D
Firewall Audit
Explanation
Vulnerability Assessment actively scans for vulnerabilities, while the others serve different security functions.
A company needs to ensure end-user devices are compliant with security policies before accessing the network. Which feature should be enabled?
-
A
Network Segmentation
-
B
Access Control List
-
C
Device Posture Assessment
-
D
Encryption Policy
Explanation
Device Posture Assessment checks compliance before granting access, unlike the other options.
What happens when a rule in Symantec DCS is set to 'Monitor' instead of 'Block'?
-
A
The action is blocked immediately.
-
B
Alerts are generated without blocking.
-
C
No action is logged.
-
D
Rules become inactive.
Explanation
Setting to 'Monitor' generates alerts without blocking, while others imply different functionalities.
Which service in Symantec Data Center Security specifically provides file integrity monitoring?
-
A
File Integrity Monitoring Service
-
B
Threat Management Service
-
C
Network Protection Service
-
D
Vulnerability Assessment Service
Explanation
File Integrity Monitoring Service tracks asset changes; other services focus on threats or scanning.
A company needs to ensure compliance with data protection regulations. What would you configure in Symantec DCS?
-
A
Network Firewall Rules
-
B
Virtual Environment Audit Logs
-
C
Activity Monitoring Policies
-
D
Advanced Threat Protection
Explanation
Activity Monitoring Policies help in compliance; others relate to direct protection or threat response.
What happens when a user attempts to execute a blocked file type in a monitored environment?
-
A
File executes normally
-
B
Execution is silently logged
-
C
User receives a warning
-
D
Execution is completely prevented
Explanation
Blocked file types are prevented from executing; others misinterpret logging or warning behavior.