VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 71–80 of 195
A company needs to protect sensitive data on a virtual machine. What is the first step they should take?
-
A
Encrypt the VM data
-
B
Remove unnecessary users
-
C
Update to latest OS
-
D
Install additional software
Explanation
Encrypting VM data is crucial for protection.
You are configuring firewall rules for vSphere. What happens when a rule is set to 'Allow' for a specific IP range?
-
A
Traffic from that range is blocked
-
B
Traffic from that range is allowed
-
C
Only outbound traffic is affected
-
D
All traffic is denied
Explanation
'Allow' enables traffic from the specified IP range.
Which service provides malware defense in Symantec DCS?
-
A
Host Integrity Monitoring
-
B
Endpoint Protection
-
C
Application Control
-
D
Web Isolation
Explanation
Endpoint Protection is specifically designed for malware defense, while the others serve different functions.
A company needs to prevent unauthorized process execution. Which feature should they utilize?
-
A
Whitelist processes
-
B
Behavior-based detection
-
C
Network security policies
-
D
Intrusion detection system
Explanation
Whitelisting processes effectively prevents unauthorized executions, while others do not specifically address this need.
You are configuring a security policy with both allow and block rules. What happens when a packet matches both?
-
A
Packet is always allowed
-
B
Packet is always blocked
-
C
Packet behavior is undefined
-
D
Block rules take precedence
Explanation
In security policies, block rules take precedence over allow rules for packet control scenarios.
Which service provides monitoring of application behavior?
-
A
Application Control
-
B
File Integrity Monitoring
-
C
Host Intrusion Prevention
-
D
Network Traffic Analysis
Explanation
Application Control specifically monitors and regulates application behavior; others focus on different aspects of security.
A company needs to ensure data is not altered during transmission. What should they implement?
-
A
Encryption
-
B
Firewall rules
-
C
Data Archiving
-
D
User Access Control
Explanation
Encryption protects data in transit from alteration; other options do not address data integrity directly.
You are configuring a new security policy. What happens when you enable 'Auto-Blocking' in firewall configurations?
-
A
Blocks all traffic instantly
-
B
Only blocks suspicious behavior
-
C
Logs all blocked traffic
-
D
Automatic configuration changes
Explanation
'Auto-Blocking' specifically targets and blocks suspicious behavior, not all traffic or configurations.
Which service in Symantec DCS specifically mitigates against file integrity breaches?
-
A
File Integrity Monitoring
-
B
Web Application Firewall
-
C
Endpoint Protection
-
D
Vulnerability Management
Explanation
File Integrity Monitoring tracks changes to files, essential for breach detection, unlike the others.
A company needs to comply with GDPR; which DCS capability assists in this requirement?
-
A
Network Segmentation
-
B
Data Protection Policy
-
C
Patch Management
-
D
Incident Response
Explanation
Data Protection Policy ensures compliance by managing personal data, whereas others focus on general cybersecurity.