VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 181–190 of 195

Q181

Which service is primarily responsible for network intrusion detection in Symantec DCS?

  • A Intrusion Detection Service
  • B File Integrity Monitoring
  • C Application Control
  • D Endpoint Protection
Explanation Intrusion Detection Service detects unauthorized network access, while others focus on different aspects of security.
Q182

A company needs to ensure compliance with data protection regulations. What should they implement?

  • A Endpoint Protection only
  • B File Integrity Monitoring
  • C Network Segmentation
  • D Intrusion Prevention System
Explanation File Integrity Monitoring ensures all changes are tracked, aiding compliance efforts, unlike the others.
Q183

You are configuring the Symantec DCS dashboard. What happens if you disable the alert notifications?

  • A Only informative alerts will be sent
  • B All alerts will still be logged
  • C No alerts will be logged
  • D Only critical alerts will be sent
Explanation Disabling notifications suppresses alerts but does not prevent logging of events.
Q184

Which service helps to enforce security policies on virtual servers?

  • A Data Center Security Advanced
  • B Symantec Endpoint Protection
  • C VMware vSphere
  • D Microsoft Azure Security Center
Explanation Data Center Security Advanced enforces security policies on virtual servers; others do not focus primarily on server security.
Q185

A company needs to ensure their VMs are compliant with internal security standards. Which feature assists with this compliance checking?

  • A Log Management
  • B Policy Enforcement
  • C Resource Monitoring
  • D Network Analysis
Explanation Policy Enforcement helps ensure compliance with security standards; the others do not focus on compliance.
Q186

What happens when security policies are misconfigured in Symantec Data Center Security?

  • A All virtual machines are deleted
  • B Protection features become ineffective
  • C Performance increases significantly
  • D Monitoring is enhanced automatically
Explanation Misconfigured policies lead to ineffective protection; the other options are incorrect behaviors resulting from misconfiguration.
Q187

Which service monitors and manages file integrity?

  • A File Integrity Monitoring
  • B System Integrity Control
  • C Data Loss Prevention
  • D Vulnerability Assessment
Explanation File Integrity Monitoring tracks changes to files, while the others focus on different aspects of security.
Q188

A company needs to secure sensitive data stored in a public cloud. What configuration option should they prioritize?

  • A Encrypt data at rest
  • B Limit access by IP
  • C Use a strong password policy
  • D Monitor network traffic
Explanation Encrypting data at rest protects it from unauthorized access, whereas the others offer varying levels of security not directly addressing data protection.
Q189

What happens when a host breaches a security policy configured in the Data Center Security environment?

  • A Host is automatically isolated
  • B Alert is sent to administrators
  • C No action is taken
  • D Data is backed up automatically
Explanation Automatically isolating the host helps protect the environment from potential threats, while the other options do not ensure immediate security responses.
Q190

Which service is required for logging in DCS Server Advanced?

  • A User Authentication Service
  • B Network Monitoring Service
  • C Data Backup Service
  • D System Performance Service
Explanation User Authentication Service handles user logins, while the others serve different functions.