VMware

Symantec ZTNA Complete R1 Technical Specialist

250-583

Prepare for the 250-583 exam to validate your skills in Symantec ZTNA solutions.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 171–180 of 198

Q171

You are configuring session management in ZTNA. What happens when a user exceeds their session limit?

  • A User remains connected without any issue
  • B User is logged out and needs to re-authenticate
  • C Session is indefinitely extended
  • D User's access is completely revoked
Explanation Exceeding the session limit typically results in the user being logged out to ensure compliance with security policies; other options misrepresent user session behavior.
Q172

Which service provides policy-based access control in ZTNA?

  • A Access Control Service
  • B Zero Trust Policy Engine
  • C Session Management Service
  • D Network Performance Monitoring
Explanation The Zero Trust Policy Engine defines access policies, while the others serve different purposes.
Q173

A company needs to enforce continuous authentication. What should they implement?

  • A Multi-Factor Authentication
  • B Static Access Credentials
  • C Session Cookies Only
  • D Single Sign-On
Explanation Multi-Factor Authentication provides the necessary continuous verification, unlike the others that don't maintain ongoing checks.
Q174

You are configuring identity governance in ZTNA. What must you ensure?

  • A Uniform access across devices
  • B Integrated directory services
  • C Only VPN-based access
  • D Static IP address access
Explanation Integrated directory services enable effective identity governance, while the others limitation access and monitoring.
Q175

Which service in VMware ZTNA is responsible for controlling user access?

  • A Access Broker
  • B Traffic Shaper
  • C Network Analyzer
  • D Security Scanner
Explanation Access Broker manages user authentication and authorization, while the others serve different functions.
Q176

A company needs to enforce zero trust policies; which approach should they adopt?

  • A Micro-segmentation
  • B Static firewall rules
  • C Network Address Translation (NAT)
  • D Site-to-site VPN
Explanation Micro-segmentation limits access per workloads, aligning with zero trust principles unlike the other options.
Q177

What happens when users are erroneously marked as non-compliant in ZTNA?

  • A They are granted full access
  • B Their access is immediately revoked
  • C They receive a warning only
  • D They are redirected to logs
Explanation Non-compliance leads to an immediate access revoke to maintain security integrity, unlike other responses.
Q178

Which service is primarily used for identity management in Symantec ZTNA?

  • A Identity Access Management
  • B Network Traffic Analyzer
  • C Secure Web Gateway
  • D Threat Intelligence Service
Explanation Identity Access Management integrates with ZTNA to manage user identities; others focus on network security or threat analysis.
Q179

A company needs to restrict access to sensitive applications based on user location. What should they implement?

  • A Data Loss Prevention
  • B Contextual Access Policies
  • C Service Mesh Compliance
  • D Network Traffic Segmentation
Explanation Contextual Access Policies allow access restrictions based on user location; the other options pertain to different security concerns.
Q180

You are configuring ZTNA authentication. What happens when an authentication policy is set to 'Deny all' by default?

  • A All users are granted access.
  • B Only whitelisted users gain access.
  • C Zero users have access until configured.
  • D Access is granted based on IP.
Explanation Setting to 'Deny all' means zero access if not explicitly allowed; the other options contradict the default deny approach.