VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 191–195 of 195
You are configuring the Rule Set for DCS. What must your first step be?
-
A
Define the Environment
-
B
Set Execution Order
-
C
Select Audit Mode
-
D
Choose Action Type
Explanation
Defining the environment is essential before configuring the rules, while the others depend on pre-defined environments.
What happens when a rule in DCS is set to 'Audit' mode?
-
A
Blocks the action immediately
-
B
Logs the action without blocking
-
C
Requires user approval to proceed
-
D
Alerts all admin users instantly
Explanation
'Audit' mode logs actions to review later; it does not block them.
Which service in Data Center Security provides real-time monitoring?
-
A
Threat Detection Service
-
B
Data Backup Service
-
C
Network Optimization Service
-
D
User Management Service
Explanation
Threat Detection Service monitors in real time, while others don't focus on security.
A company needs to integrate Data Center Security with an orchestration tool. What should they use?
-
A
Symantec's API
-
B
VMware's NSX
-
C
Microsoft Azure
-
D
OpenStack
Explanation
Symantec's API is designed for integrations, the others are less focused on security.
You are configuring a policy for virtual machines. What happens if you set a rule to deny all traffic by default?
-
A
All traffic is blocked.
-
B
No traffic is monitored.
-
C
Only whitelist rules apply.
-
D
Traffic log is disabled
Explanation
Only explicit rules to allow traffic will take precedence over the deny rule.