VMware

Symantec VIP Technical Specialist

250-420

Prepare for the 250-420 exam to demonstrate your expertise in Symantec VIP.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 51–60 of 195

Q51

You are configuring a security policy for virtualized workloads. What should you ensure about virtual firewall rules?

  • A They are disabled in testing environments
  • B They are less strict than physical firewalls
  • C They monitor traffic without blocking
  • D They match the intended traffic only
Explanation Firewall rules should align with intended traffic; other options compromise security effectiveness.
Q52

Which service is primarily responsible for provisioning virtual machines in VMware environments?

  • A vSphere Client
  • B ESXi Hypervisor
  • C vCenter Server
  • D VMware Tools
Explanation vCenter Server centralizes VM management and provisioning, while others serve different roles.
Q53

A company needs to enforce data security policies across its virtual machines. Which VMware approach is most effective?

  • A Using firewalls exclusively
  • B Implementing NSX network segmentation
  • C Disabling all internet connections
  • D Restricting VM access to a single user
Explanation NSX provides advanced network segmentation for enhanced security, while other options do not effectively secure VMs.
Q54

What happens when you configure a Datastore Cluster with Storage DRS enabled?

  • A Automatic VM migration is disabled
  • B Resource contention detection is active
  • C VMs cannot span multiple datastores
  • D Storage I/O is always throttled
Explanation Storage DRS detects resource contention and balances workloads automatically, contrary to the other options.
Q55

Which service is used to manage firewall policies in Symantec VIP?

  • A VIP Access Management
  • B VIP Token Service
  • C VIP Identity Governance
  • D VIP Device Control
Explanation VIP Access Management is specifically designed for handling firewall policies, while the others focus on different functionalities.
Q56

A company needs to enhance security for remote workers using VMware. What should be implemented?

  • A VPN client software
  • B Local IP filtering
  • C Browser cookies audit
  • D Public Wi-Fi access
Explanation A VPN client enables secure remote access; other options do not provide adequate security for remote work.
Q57

What happens when enabled, network segmentation through VMware NSX prevents?

  • A Internal data leaks
  • B Sandboxing of applications
  • C Increase in bandwidth usage
  • D All endpoint connections
Explanation Network segmentation isolates workloads to prevent data leaks, while the others are affected differently.
Q58

Which service is used for workload automation in a VMware environment?

  • A vRealize Orchestrator
  • B vSphere Replication
  • C VMware Workstation
  • D vSAN
Explanation vRealize Orchestrator is specifically designed for automation, unlike the other services listed.
Q59

A company needs to monitor virtual machine performance metrics in real-time. What should they use?

  • A vSphere Performance Charts
  • B VMware NSX
  • C vCenter Logs
  • D ESXi Command Line
Explanation vSphere Performance Charts provide real-time metrics, while the other options do not focus on monitoring.
Q60

What happens when you exceed the maximum number of VM snapshots allowed in a vSphere environment?

  • A Older snapshots are deleted automatically
  • B Snapshots fail to create until space is made
  • C No impact on VM performance
  • D The VM crashes instantly
Explanation Exceeding snapshot limits prevents new snapshot creation without additional space, while other options incorrectly suggest behaviors.