You are configuring host assessments in Symantec Data Center Security. What happens when a host assessment is marked as non-compliant?
AData is automatically encrypted
BAlerts are generated for remediation
CAccess is permanently revoked
DConfiguration settings are lost
Explanation
Non-compliance triggers alerts for remediation, unlike the other options, which do not directly relate.
Q22
Which service does Symantec Data Center Security – Server Advanced utilize for activity monitoring?
AFile Integrity Monitoring
BReal-Time Threat Detection
CApplication Control
DNetwork Intrusion Prevention
Explanation
Real-Time Threat Detection monitors activity effectively, while the others serve different security functions.
Q23
A company needs to secure their virtualized environment from internal threats; which feature is most relevant?
AAgentless Deployment
BHost Integrity Checking
CAnti-malware Scanning
DVirtual Patch Management
Explanation
Host Integrity Checking specifically protects against internal security threats, while others address different aspects of security.
Q24
You are configuring policy enforcement; what happens when a machine goes offline?
APolicy is ignored
BLast known policy applied
CMachine is quarantined
DServer shuts down immediately
Explanation
The last known policy is applied to maintain compliance, while the other options do not represent correct behavior.
Q25
Which service does Symantec Data Center Security primarily provide for servers?
AServer hardening and compliance
BEndpoint protection against malware
CDatabase tuning and optimization
DNetwork traffic monitoring
Explanation
Symantec Data Center Security primarily focuses on server hardening and compliance, while the other options address different functionalities relevant to various security zones.
Q26
A company needs to segregate its database servers from other applications. Which feature of Symantec Data Center Security should they implement?
ARuntime application self-protection
BHost-based intrusion detection system
CMicrosegmentation between components
DCloud workload protection
Explanation
Microsegmentation effectively isolates database servers, while the other options serve different purposes.
Q27
You are configuring scheduled scans in Symantec Data Center Security. What happens when a scan is triggered?
AAll servers will automatically reboot
BService disruption occurs during the scan
CServer performance degrades temporarily
DPolicy violations may be detected
Explanation
Scheduled scans identify policy violations, while the other options misrepresent scan impacts on the environment.
Q28
Which service is primarily responsible for monitoring security policy violations in DCS?
ASecurity Intelligence Service
BData Protection Service
CCompliance Management Service
DNetwork Defense Service
Explanation
The Security Intelligence Service monitors policy violations; others serve different roles in DCS.
Q29
A company needs to protect its virtual machines from unauthorized access. What feature should they enable?
AVirtual Machine Encryption
BShadow Copy
CSnapshot Backup
DNetwork Isolation
Explanation
Virtual Machine Encryption secures access; others do not directly protect VMs.
Q30
You are configuring an agent in DCS. What happens when you improperly set the communication port?
AAgent may function normally
BAll data will be recorded
CAgent will fail to communicate
DSystem will override the settings
Explanation
An improper port setting disrupts agent communication; the other options are incorrect consequences.