VMware

Symantec VIP Technical Specialist

250-420

Prepare for the 250-420 exam to demonstrate your expertise in Symantec VIP.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 111–120 of 195

Q111

You are configuring an access policy in VIP. What happens when a user fails two-factor authentication?

  • A Access is granted after timeout
  • B User is permanently locked out
  • C Access is denied, retries may occur
  • D User is redirected to help desk
Explanation The user is denied access after failing two-factor authentication, typically allowing for retry attempts depending on configuration.
Q112

Which service provides application layer security for SaaS applications?

  • A Symantec CloudSOC
  • B VMware NSX
  • C VMware HCX
  • D Symantec Endpoint Protection
Explanation Symantec CloudSOC secures applications via identity and access management, while the others focus on different security aspects.
Q113

A company needs to ensure compliance by restricting data access based on user roles in a cloud application. What technology could help achieve this?

  • A VMware vSAN
  • B Role-Based Access Control (RBAC)?
  • C VMware Horizon
  • D Data Loss Prevention (DLP)
Explanation RBAC directly manages role-based permissions; the others serve different functions.
Q114

You are configuring a data retention policy for an organization’s cloud data. What crucial aspect should you consider?

  • A User login frequency
  • B Data classification requirements
  • C System uptime percentages
  • D Employee productivity metrics
Explanation Data classification determines how long data must be retained, unlike the other options that are irrelevant.
Q115

Which service allows centralized management of endpoints?

  • A Symantec Endpoint Management
  • B Symantec Threat Analysis
  • C Symantec Data Loss Prevention
  • D Symantec Cloud Security
Explanation Symantec Endpoint Management centralizes endpoint control, others do not focus on management specifically.
Q116

A company needs to ensure real-time protection against malware. What should they implement?

  • A Backup solutions
  • B Antivirus software
  • C Patch management
  • D Network monitoring
Explanation Antivirus software provides real-time malware protection; other options do not specifically address malware threats.
Q117

You are configuring endpoint policies for a remote workforce. What happens when a policy conflicts with a user's local settings?

  • A Local settings override endpoint policies
  • B Endpoint policies always take precedence
  • C Policy conflicts cause system failures
  • D Both settings apply equally to endpoints
Explanation Endpoint policies typically take precedence over local user settings to maintain security compliance, others are incorrect assumptions about behavior.
Q118

Which service offers detailed visibility into application performance?

  • A VMware AppDefense
  • B VMware vRealize Operations
  • C VMware NSX-T
  • D VMware Cloud Foundation
Explanation vRealize Operations enables application performance monitoring; others focus on security or network management.
Q119

A company needs to ensure its critical VM is backed up while incorporating change tracking. What should they implement?

  • A VMware vSphere Replication
  • B VMware Site Recovery Manager
  • C VMware Data Protection
  • D VMware vMotion
Explanation Site Recovery Manager provides backup with change tracking; vMotion is for live migration, others are not primarily for backup.
Q120

What happens when a snapshot is taken of a powered-on VM and the VM is then powered off?

  • A The snapshot is deleted automatically
  • B The VM state is saved in the snapshot
  • C The snapshot captures the VM’s powered-off state
  • D No changes are recorded in the snapshot
Explanation The snapshot captures the VM's state even if powered off; A is incorrect as snapshots remain, B misunderstands the snapshot, D is incorrect as snapshots do record changes.