VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 21–30 of 195

Q21

You are configuring host assessments in Symantec Data Center Security. What happens when a host assessment is marked as non-compliant?

  • A Data is automatically encrypted
  • B Alerts are generated for remediation
  • C Access is permanently revoked
  • D Configuration settings are lost
Explanation Non-compliance triggers alerts for remediation, unlike the other options, which do not directly relate.
Q22

Which service does Symantec Data Center Security – Server Advanced utilize for activity monitoring?

  • A File Integrity Monitoring
  • B Real-Time Threat Detection
  • C Application Control
  • D Network Intrusion Prevention
Explanation Real-Time Threat Detection monitors activity effectively, while the others serve different security functions.
Q23

A company needs to secure their virtualized environment from internal threats; which feature is most relevant?

  • A Agentless Deployment
  • B Host Integrity Checking
  • C Anti-malware Scanning
  • D Virtual Patch Management
Explanation Host Integrity Checking specifically protects against internal security threats, while others address different aspects of security.
Q24

You are configuring policy enforcement; what happens when a machine goes offline?

  • A Policy is ignored
  • B Last known policy applied
  • C Machine is quarantined
  • D Server shuts down immediately
Explanation The last known policy is applied to maintain compliance, while the other options do not represent correct behavior.
Q25

Which service does Symantec Data Center Security primarily provide for servers?

  • A Server hardening and compliance
  • B Endpoint protection against malware
  • C Database tuning and optimization
  • D Network traffic monitoring
Explanation Symantec Data Center Security primarily focuses on server hardening and compliance, while the other options address different functionalities relevant to various security zones.
Q26

A company needs to segregate its database servers from other applications. Which feature of Symantec Data Center Security should they implement?

  • A Runtime application self-protection
  • B Host-based intrusion detection system
  • C Microsegmentation between components
  • D Cloud workload protection
Explanation Microsegmentation effectively isolates database servers, while the other options serve different purposes.
Q27

You are configuring scheduled scans in Symantec Data Center Security. What happens when a scan is triggered?

  • A All servers will automatically reboot
  • B Service disruption occurs during the scan
  • C Server performance degrades temporarily
  • D Policy violations may be detected
Explanation Scheduled scans identify policy violations, while the other options misrepresent scan impacts on the environment.
Q28

Which service is primarily responsible for monitoring security policy violations in DCS?

  • A Security Intelligence Service
  • B Data Protection Service
  • C Compliance Management Service
  • D Network Defense Service
Explanation The Security Intelligence Service monitors policy violations; others serve different roles in DCS.
Q29

A company needs to protect its virtual machines from unauthorized access. What feature should they enable?

  • A Virtual Machine Encryption
  • B Shadow Copy
  • C Snapshot Backup
  • D Network Isolation
Explanation Virtual Machine Encryption secures access; others do not directly protect VMs.
Q30

You are configuring an agent in DCS. What happens when you improperly set the communication port?

  • A Agent may function normally
  • B All data will be recorded
  • C Agent will fail to communicate
  • D System will override the settings
Explanation An improper port setting disrupts agent communication; the other options are incorrect consequences.