VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 61–70 of 195
Which service does Symantec Data Center Security use for agent communication?
-
A
Symantec Endpoint Protection
-
B
BCB (Breach Communication Bridge)
-
C
Network Time Protocol
-
D
Secure Socket Layer
Explanation
BCB is utilized for agent and management server communication; others are unrelated to DCS.
A company needs to ensure compliance with security policies in their virtualized environment. What feature should they implement?
-
A
Virtual Machine Hardening
-
B
Network Segmentation
-
C
Agent-Based Monitoring
-
D
Unified Threat Management
Explanation
Agent-Based Monitoring ensures adherence to security policies directly.
You are configuring a security policy in Symantec Data Center Security. What happens when you enable the 'Deny' option for a specific process?
-
A
The process is logged only
-
B
The process is always allowed
-
C
The process is terminated and blocked
-
D
The process passes with warnings
Explanation
When 'Deny' is enabled, it blocks and terminates the offending process.
Which service provides real-time protection against zero-day attacks in Symantec Data Center Security?
-
A
File Integrity Monitoring
-
B
Application Control
-
C
Behavioral Analysis
-
D
Host Intrusion Prevention
Explanation
Behavioral Analysis detects abnormal behavior indicating new attacks; others focus on specific vulnerabilities.
A company needs to enforce compliance for server configurations. Which feature should they use?
-
A
Policy Management
-
B
Log Management
-
C
Network Auditing
-
D
Vulnerability Scanning
Explanation
Policy Management ensures configurations comply with security guidelines, while others focus on broader security aspects.
What happens when you configure an exception for a process in Symantec Data Center Security?
-
A
All alerts are disabled for that process
-
B
The process is excluded from scanning
-
C
The process will have reduced privileges
-
D
Events related to this process are archived
Explanation
Exclusions prevent specific processes from being scanned, while the other options do not accurately describe the exception's effect.
What happens when a server with Data Center Security is breached?
-
A
Immediate isolation from network.
-
B
No immediate action taken.
-
C
System automatically reboots.
-
D
Data is permanently deleted.
Explanation
Immediate isolation prevents further damage; others do not apply.
A company needs to ensure data integrity on virtual machines. Which feature can they leverage?
-
A
File Integrity Monitoring.
-
B
Virtual Machine Cloning.
-
C
Resource Pooling.
-
D
Snapshot Management.
Explanation
File Integrity Monitoring ensures that data integrity is maintained; others serve different purposes.
You are configuring Security Policies in Data Center Security. Which policy is most critical for protecting sensitive data?
-
A
Antivirus Policy.
-
B
Firewall Policy.
-
C
Data Loss Prevention Policy.
-
D
Access Control Policy.
Explanation
Data Loss Prevention Policy directly focuses on protecting sensitive data; others do not specifically address this.
Which service is responsible for enforcing security policies in VMware Data Center Security?
-
A
Security Server
-
B
Data Server
-
C
Management Console
-
D
Client Agent
Explanation
The Security Server enforces security policies while the others do not.