VMware
Symantec VIP Technical Specialist
250-420
Prepare for the 250-420 exam to demonstrate your expertise in Symantec VIP.
195 questions
0 views
Free
Questions 51–60 of 195
You are configuring a security policy for virtualized workloads. What should you ensure about virtual firewall rules?
-
A
They are disabled in testing environments
-
B
They are less strict than physical firewalls
-
C
They monitor traffic without blocking
-
D
They match the intended traffic only
Explanation
Firewall rules should align with intended traffic; other options compromise security effectiveness.
Which service is primarily responsible for provisioning virtual machines in VMware environments?
-
A
vSphere Client
-
B
ESXi Hypervisor
-
C
vCenter Server
-
D
VMware Tools
Explanation
vCenter Server centralizes VM management and provisioning, while others serve different roles.
A company needs to enforce data security policies across its virtual machines. Which VMware approach is most effective?
-
A
Using firewalls exclusively
-
B
Implementing NSX network segmentation
-
C
Disabling all internet connections
-
D
Restricting VM access to a single user
Explanation
NSX provides advanced network segmentation for enhanced security, while other options do not effectively secure VMs.
What happens when you configure a Datastore Cluster with Storage DRS enabled?
-
A
Automatic VM migration is disabled
-
B
Resource contention detection is active
-
C
VMs cannot span multiple datastores
-
D
Storage I/O is always throttled
Explanation
Storage DRS detects resource contention and balances workloads automatically, contrary to the other options.
Which service is used to manage firewall policies in Symantec VIP?
-
A
VIP Access Management
-
B
VIP Token Service
-
C
VIP Identity Governance
-
D
VIP Device Control
Explanation
VIP Access Management is specifically designed for handling firewall policies, while the others focus on different functionalities.
A company needs to enhance security for remote workers using VMware. What should be implemented?
-
A
VPN client software
-
B
Local IP filtering
-
C
Browser cookies audit
-
D
Public Wi-Fi access
Explanation
A VPN client enables secure remote access; other options do not provide adequate security for remote work.
What happens when enabled, network segmentation through VMware NSX prevents?
-
A
Internal data leaks
-
B
Sandboxing of applications
-
C
Increase in bandwidth usage
-
D
All endpoint connections
Explanation
Network segmentation isolates workloads to prevent data leaks, while the others are affected differently.
Which service is used for workload automation in a VMware environment?
-
A
vRealize Orchestrator
-
B
vSphere Replication
-
C
VMware Workstation
-
D
vSAN
Explanation
vRealize Orchestrator is specifically designed for automation, unlike the other services listed.
A company needs to monitor virtual machine performance metrics in real-time. What should they use?
-
A
vSphere Performance Charts
-
B
VMware NSX
-
C
vCenter Logs
-
D
ESXi Command Line
Explanation
vSphere Performance Charts provide real-time metrics, while the other options do not focus on monitoring.
What happens when you exceed the maximum number of VM snapshots allowed in a vSphere environment?
-
A
Older snapshots are deleted automatically
-
B
Snapshots fail to create until space is made
-
C
No impact on VM performance
-
D
The VM crashes instantly
Explanation
Exceeding snapshot limits prevents new snapshot creation without additional space, while other options incorrectly suggest behaviors.