VMware
Symantec Data Center Security – Server Advanced 6.x Technical Specialist
250-611
Get certified with the 250-611 exam focusing on Data Center Security.
195 questions
0 views
Free
Questions 81–90 of 195
You are configuring logging in DCS; what happens when the log retention is set too low?
-
A
Logs fill up storage quickly
-
B
Older logs may be overwritten
-
C
Increased incident response time
-
D
No impact on system performance
Explanation
Setting low retention can lead to overwriting logs, impacting future investigations.
Which service in Symantec DCS enables workload visibility?
-
A
Data Center Security Manager
-
B
Threat Detection Service
-
C
File Integrity Monitoring
-
D
Real-time Threat Analysis
Explanation
Data Center Security Manager provides comprehensive workload visibility; the other services focus on specific aspects.
A company needs to ensure compliance by automating patch management for its servers. What should they enable in DCS?
-
A
File Integrity Monitoring
-
B
Policy Enforcement
-
C
Endpoint Encryption
-
D
Threat Protection
Explanation
Policy Enforcement helps automate compliance checks; the other options do not focus on patch management.
You are configuring the file integrity monitoring feature. What happens if a critical change is detected?
-
A
No action is taken.
-
B
Alerts are generated.
-
C
Changes are automatically reverted.
-
D
Monitoring is disabled.
Explanation
Alerts are generated to notify admins of changes; other options incorrectly describe the system's behavior.
Which service provides real-time file integrity monitoring?
-
A
File Integrity Monitoring Service
-
B
Data Loss Prevention Service
-
C
Endpoint Protection Service
-
D
Log Monitoring Service
Explanation
File Integrity Monitoring Service detects changes to files, while others monitor data loss, endpoints, or logs.
A company needs to ensure its web application is protected from SQL injection attacks. What feature should they enable?
-
A
Web Application Firewall Rules
-
B
Intrusion Prevention System
-
C
Antivirus Scanning
-
D
User Authentication
Explanation
Web Application Firewall Rules specifically target SQL injection, while others do not address this type of threat.
You are configuring a policy for privileged user access. What should you implement to review their activity?
-
A
Audit Logging
-
B
Browser History
-
C
User Training Session
-
D
Temporary Access Permission
Explanation
Audit Logging provides accountability for privileged users, while others do not adequately track activity.
Which service provides real-time monitoring for server threats?
-
A
Symantec Data Center Security
-
B
VMware vSphere
-
C
Microsoft Defender
-
D
Cisco Firepower
Explanation
Symantec Data Center Security provides real-time monitoring for threats; the others are not primarily designed for this.
A company needs to enforce compliance in a virtual environment. What should they prioritize?
-
A
User training programs
-
B
Data backup solutions
-
C
Security policies and audits
-
D
Network speed improvements
Explanation
Security policies and audits directly enforce compliance, unlike the other options.
You are configuring server security policies. What happens when you set a policy to 'Block'?
-
A
All network traffic is allowed
-
B
Specified actions are blocked
-
C
Only alerts are generated
-
D
No changes are applied
Explanation
Setting a policy to 'Block' prevents specified actions while the other options describe different scenarios.