You are configuring an access policy in VIP. What happens when a user fails two-factor authentication?
AAccess is granted after timeout
BUser is permanently locked out
CAccess is denied, retries may occur
DUser is redirected to help desk
Explanation
The user is denied access after failing two-factor authentication, typically allowing for retry attempts depending on configuration.
Q112
Which service provides application layer security for SaaS applications?
ASymantec CloudSOC
BVMware NSX
CVMware HCX
DSymantec Endpoint Protection
Explanation
Symantec CloudSOC secures applications via identity and access management, while the others focus on different security aspects.
Q113
A company needs to ensure compliance by restricting data access based on user roles in a cloud application. What technology could help achieve this?
AVMware vSAN
BRole-Based Access Control (RBAC)?
CVMware Horizon
DData Loss Prevention (DLP)
Explanation
RBAC directly manages role-based permissions; the others serve different functions.
Q114
You are configuring a data retention policy for an organization’s cloud data. What crucial aspect should you consider?
AUser login frequency
BData classification requirements
CSystem uptime percentages
DEmployee productivity metrics
Explanation
Data classification determines how long data must be retained, unlike the other options that are irrelevant.
Q115
Which service allows centralized management of endpoints?
ASymantec Endpoint Management
BSymantec Threat Analysis
CSymantec Data Loss Prevention
DSymantec Cloud Security
Explanation
Symantec Endpoint Management centralizes endpoint control, others do not focus on management specifically.
Q116
A company needs to ensure real-time protection against malware. What should they implement?
ABackup solutions
BAntivirus software
CPatch management
DNetwork monitoring
Explanation
Antivirus software provides real-time malware protection; other options do not specifically address malware threats.
Q117
You are configuring endpoint policies for a remote workforce. What happens when a policy conflicts with a user's local settings?
ALocal settings override endpoint policies
BEndpoint policies always take precedence
CPolicy conflicts cause system failures
DBoth settings apply equally to endpoints
Explanation
Endpoint policies typically take precedence over local user settings to maintain security compliance, others are incorrect assumptions about behavior.
Q118
Which service offers detailed visibility into application performance?
AVMware AppDefense
BVMware vRealize Operations
CVMware NSX-T
DVMware Cloud Foundation
Explanation
vRealize Operations enables application performance monitoring; others focus on security or network management.
Q119
A company needs to ensure its critical VM is backed up while incorporating change tracking. What should they implement?
AVMware vSphere Replication
BVMware Site Recovery Manager
CVMware Data Protection
DVMware vMotion
Explanation
Site Recovery Manager provides backup with change tracking; vMotion is for live migration, others are not primarily for backup.
Q120
What happens when a snapshot is taken of a powered-on VM and the VM is then powered off?
AThe snapshot is deleted automatically
BThe VM state is saved in the snapshot
CThe snapshot captures the VM’s powered-off state
DNo changes are recorded in the snapshot
Explanation
The snapshot captures the VM's state even if powered off; A is incorrect as snapshots remain, B misunderstands the snapshot, D is incorrect as snapshots do record changes.