VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 71–80 of 195

Q71

A company needs to protect sensitive data on a virtual machine. What is the first step they should take?

  • A Encrypt the VM data
  • B Remove unnecessary users
  • C Update to latest OS
  • D Install additional software
Explanation Encrypting VM data is crucial for protection.
Q72

You are configuring firewall rules for vSphere. What happens when a rule is set to 'Allow' for a specific IP range?

  • A Traffic from that range is blocked
  • B Traffic from that range is allowed
  • C Only outbound traffic is affected
  • D All traffic is denied
Explanation 'Allow' enables traffic from the specified IP range.
Q73

Which service provides malware defense in Symantec DCS?

  • A Host Integrity Monitoring
  • B Endpoint Protection
  • C Application Control
  • D Web Isolation
Explanation Endpoint Protection is specifically designed for malware defense, while the others serve different functions.
Q74

A company needs to prevent unauthorized process execution. Which feature should they utilize?

  • A Whitelist processes
  • B Behavior-based detection
  • C Network security policies
  • D Intrusion detection system
Explanation Whitelisting processes effectively prevents unauthorized executions, while others do not specifically address this need.
Q75

You are configuring a security policy with both allow and block rules. What happens when a packet matches both?

  • A Packet is always allowed
  • B Packet is always blocked
  • C Packet behavior is undefined
  • D Block rules take precedence
Explanation In security policies, block rules take precedence over allow rules for packet control scenarios.
Q76

Which service provides monitoring of application behavior?

  • A Application Control
  • B File Integrity Monitoring
  • C Host Intrusion Prevention
  • D Network Traffic Analysis
Explanation Application Control specifically monitors and regulates application behavior; others focus on different aspects of security.
Q77

A company needs to ensure data is not altered during transmission. What should they implement?

  • A Encryption
  • B Firewall rules
  • C Data Archiving
  • D User Access Control
Explanation Encryption protects data in transit from alteration; other options do not address data integrity directly.
Q78

You are configuring a new security policy. What happens when you enable 'Auto-Blocking' in firewall configurations?

  • A Blocks all traffic instantly
  • B Only blocks suspicious behavior
  • C Logs all blocked traffic
  • D Automatic configuration changes
Explanation 'Auto-Blocking' specifically targets and blocks suspicious behavior, not all traffic or configurations.
Q79

Which service in Symantec DCS specifically mitigates against file integrity breaches?

  • A File Integrity Monitoring
  • B Web Application Firewall
  • C Endpoint Protection
  • D Vulnerability Management
Explanation File Integrity Monitoring tracks changes to files, essential for breach detection, unlike the others.
Q80

A company needs to comply with GDPR; which DCS capability assists in this requirement?

  • A Network Segmentation
  • B Data Protection Policy
  • C Patch Management
  • D Incident Response
Explanation Data Protection Policy ensures compliance by managing personal data, whereas others focus on general cybersecurity.