A company needs to enforce data-at-rest protection. What should they implement?
AData Encryption
BFirewall Rules
CUser Access Control
DAPI Key Rotation
Explanation
Data Encryption ensures data-at-rest protection; other options do not specifically address this need.
Q42
You are configuring policies for DCS. What happens when an exception is created?
ABlocks all future changes
BOverrides existing policy rules
CDecreases system security
DShows a warning only
Explanation
Creating an exception overrides existing policy rules, while others do not accurately describe its impact.
Q43
Which service in Symantec Data Center Security primarily monitors file integrity?
AFile Integrity Monitoring Service
BVulnerability Management Service
CMalware Protection Service
DNetwork Traffic Analysis Service
Explanation
File Integrity Monitoring Service checks for unauthorized changes, while the others serve different functions.
Q44
You are configuring application control policies. What should you prioritize to prevent unauthorized software installations?
AAllow all unsigned applications
BCreate broad software allowlists
CImplement a allowlist with specific applications
DEnable file modification tracking only
Explanation
An allowlist with specific applications prevents unauthorized installations, unlike broad settings or tracking alone.
Q45
A company needs to ensure compliance across multiple data centers. What happens when the agent configuration is not synchronized?
ANo policies will be enforced.
BConfigurations remain independent.
CUpdates apply to all agents.
DCompliance reports become irrelevant.
Explanation
Different configurations lead to independent policy enforcement, potentially impacting compliance, while the other options are incorrect effects.
Q46
Which service in Symantec Data Center Security provides real-time monitoring?
AHost Integrity Monitoring
BPolicy Compliance
CFile Integrity Monitoring
DBehavioral Analysis
Explanation
Host Integrity Monitoring provides continuous assessment of system compliance, while others have different focuses.
Q47
A company needs to apply rule sets to guest VMs. What should be configured in the Symantec DCS?
AAgent Policies
BNetwork Policies
CFirewall Rules
DIncident Management
Explanation
Agent Policies define specific rules for endpoint security, whereas others do not directly apply rules to VMs.
Q48
What happens when a false positive is identified in Symantec DCS?
AAlert is generated
BFile is automatically quarantined
CSystem performance is degraded
DPolicy is disabled
Explanation
A false positive triggers an alert for further investigation, while other options misrepresent typical outcomes.
Q49
What is the primary function of the Symantec DCS Server Advanced agent?
AReal-time threat detection and prevention
BNetwork traffic analysis
CData backup management
DUser access control
Explanation
The agent provides real-time threat detection and prevention by monitoring servers for malicious activity, while the others do not pertain to its main function.
Q50
A company needs to enforce policies across multiple virtual machines. What should they implement?
ASymantec DCS Management Console
BHypervisor backup tool
CVirtual machine cloning
DPerformance monitoring suite
Explanation
The Symantec DCS Management Console allows centralized policy enforcement across virtual machines, while the other options do not serve this purpose.