VMware

Symantec Data Center Security – Server Advanced 6.x Technical Specialist

250-611

Get certified with the 250-611 exam focusing on Data Center Security.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 81–90 of 195

Q81

You are configuring logging in DCS; what happens when the log retention is set too low?

  • A Logs fill up storage quickly
  • B Older logs may be overwritten
  • C Increased incident response time
  • D No impact on system performance
Explanation Setting low retention can lead to overwriting logs, impacting future investigations.
Q82

Which service in Symantec DCS enables workload visibility?

  • A Data Center Security Manager
  • B Threat Detection Service
  • C File Integrity Monitoring
  • D Real-time Threat Analysis
Explanation Data Center Security Manager provides comprehensive workload visibility; the other services focus on specific aspects.
Q83

A company needs to ensure compliance by automating patch management for its servers. What should they enable in DCS?

  • A File Integrity Monitoring
  • B Policy Enforcement
  • C Endpoint Encryption
  • D Threat Protection
Explanation Policy Enforcement helps automate compliance checks; the other options do not focus on patch management.
Q84

You are configuring the file integrity monitoring feature. What happens if a critical change is detected?

  • A No action is taken.
  • B Alerts are generated.
  • C Changes are automatically reverted.
  • D Monitoring is disabled.
Explanation Alerts are generated to notify admins of changes; other options incorrectly describe the system's behavior.
Q85

Which service provides real-time file integrity monitoring?

  • A File Integrity Monitoring Service
  • B Data Loss Prevention Service
  • C Endpoint Protection Service
  • D Log Monitoring Service
Explanation File Integrity Monitoring Service detects changes to files, while others monitor data loss, endpoints, or logs.
Q86

A company needs to ensure its web application is protected from SQL injection attacks. What feature should they enable?

  • A Web Application Firewall Rules
  • B Intrusion Prevention System
  • C Antivirus Scanning
  • D User Authentication
Explanation Web Application Firewall Rules specifically target SQL injection, while others do not address this type of threat.
Q87

You are configuring a policy for privileged user access. What should you implement to review their activity?

  • A Audit Logging
  • B Browser History
  • C User Training Session
  • D Temporary Access Permission
Explanation Audit Logging provides accountability for privileged users, while others do not adequately track activity.
Q88

Which service provides real-time monitoring for server threats?

  • A Symantec Data Center Security
  • B VMware vSphere
  • C Microsoft Defender
  • D Cisco Firepower
Explanation Symantec Data Center Security provides real-time monitoring for threats; the others are not primarily designed for this.
Q89

A company needs to enforce compliance in a virtual environment. What should they prioritize?

  • A User training programs
  • B Data backup solutions
  • C Security policies and audits
  • D Network speed improvements
Explanation Security policies and audits directly enforce compliance, unlike the other options.
Q90

You are configuring server security policies. What happens when you set a policy to 'Block'?

  • A All network traffic is allowed
  • B Specified actions are blocked
  • C Only alerts are generated
  • D No changes are applied
Explanation Setting a policy to 'Block' prevents specified actions while the other options describe different scenarios.