VMware
Symantec ZTNA Complete R1 Technical Specialist
250-583
Prepare for the 250-583 exam to validate your skills in Symantec ZTNA solutions.
198 questions
0 views
Free
Questions 191–198 of 198
A company needs to restrict access to sensitive applications based on user identity. What feature should they implement?
-
A
Role-Based Access Control (RBAC)
-
B
Static IP Whitelisting
-
C
VPN access only
-
D
Public Key Infrastructure (PKI)
Explanation
RBAC effectively manages access based on user identity, unlike the other options which do not address user identity-specific access.
What happens when a user attempts to access a ZTNA-protected resource without a valid device posture?
-
A
Access is granted with limited permissions
-
B
Access is denied entirely
-
C
Access is granted with a warning
-
D
User is redirected to a help page
Explanation
Access is denied to non-compliant devices, ensuring security standards are met.
Which service is essential for integrating ZTNA with existing IAM solutions?
-
A
Identity Provider Service
-
B
Load Balancer Service
-
C
VPN Service
-
D
Endpoint Security Service
Explanation
Identity Provider Service enables user authentication and access control, while others do not directly relate to IAM integration.
A company needs to grant RDP access only to authenticated users. What should they implement?
-
A
Basic Firewall Rules
-
B
ZTNA Solution
-
C
Static IP Access Control
-
D
Site-to-Site VPN
Explanation
ZTNA provides secure, conditional access based on user identity, unlike the other options which are less secure.
You are configuring ZTNA policies. What happens when a user exceeds allowed connection attempts?
-
A
Access is permanently revoked
-
B
User is logged out only
-
C
User receives a warning
-
D
Access is temporarily restricted
Explanation
Access is temporarily restricted to enhance security, while others either lack a security measure or are too severe.
Which service enables application access based on user identity?
-
A
Zero Trust Network Access
-
B
Virtual Private Network
-
C
Secure Web Gateway
-
D
Firewalls
Explanation
Zero Trust Network Access ensures access by validating user identity, unlike traditional methods.
A company needs to secure their SaaS applications without modifying on-prem infrastructure. What is the best approach?
-
A
Implement VPNs for all users
-
B
Use ZTNA solutions
-
C
Deploy additional firewalls
-
D
Conduct network segmentation
Explanation
ZTNA solutions provide secure access to SaaS without changing on-premises systems.
What happens when a user's device is detected as noncompliant in a ZTNA implementation?
-
A
Access is granted with restrictions
-
B
Access is denied completely
-
C
User is notified and remediated
-
D
Device is automatically quarantined
Explanation
Users are typically notified to fix compliance issues before granting full access.