Which service in VMware Carbon Black Application Control allows you to create policies for application usage?
APolicy Management
BApplication Governance
CSystem Integrity
DIncident Response
Explanation
Policy Management is specifically designed for creating and applying policies about application usage, while others do not focus on this functionality.
Q2
A company needs to restrict the installation of unauthorized applications. What is the best approach using VMware Carbon Black Application Control?
AEnable Application Rules
BDisable User Access
CUninstall Current Applications
DEnhance Network Security
Explanation
Enabling Application Rules directly controls which applications can be installed, while the other options do not effectively restrict installations.
Q3
What happens when a user tries to run an application not covered by the current policies in VMware Carbon Black Application Control?
AApplication runs normally
BUser is prompted for approval
CApplication is blocked
DThe system crashes
Explanation
Applications not covered by current policies are blocked to maintain security, while the other options do not reflect the expected actions in this scenario.
Q4
Which service provides application whitelisting in VMware Carbon Black?
AApplication Control
BThreat Analysis
CNetwork Security
DUser Behavior Analysis
Explanation
Application Control specifically focuses on application whitelisting, while the others provide different security functions.
Q5
A company needs to allow a third-party software installer but want to restrict general internal installer use. What should they configure?
AAllow lists for both types
BCustom policy for vendors
CGlobal block policy
DRemove all installer access
Explanation
Creating a custom policy for vendors allows allowed installations while restricting internal tools.
Q6
What happens when a blocked application attempts to run under Carbon Black?
AThe application is allowed
BThe user is notified
CThe application is quarantined
DThe application fails to execute
Explanation
Blocked applications fail to execute entirely, thus ensuring compliance with security policies.
Q7
Which service is primarily responsible for monitoring unauthorized changes to files?
AFile Integrity Monitoring
BNetwork Traffic Analysis
CUser Behavior Analytics
DEndpoint Detection and Response
Explanation
File Integrity Monitoring detects unauthorized file changes while others focus on different areas.
Q8
A company needs to restrict application usage for a specific department. Which feature should they implement?
AWhitelisting
BSandboxing
CVirtualization
DEncryption
Explanation
Whitelisting allows control over which applications are permitted; others serve different security purposes.
Q9
What happens when a file not on the whitelist is executed?
AThe file executes normally
BExecution is blocked
CFile is quarantined
DUser receives an alert
Explanation
Execution is blocked for unapproved files, while others imply alternatives not applicable under whitelisting rules.
Q10
You are configuring the Carbon Black Application Control server's communication settings. Which setting allows the server to communicate with endpoints over an encrypted channel?
ASSL/TLS Configuration
BUser Authentication
CPolicy Enforcement
DSession Management
Explanation
SSL/TLS Configuration enables secure communication, while the others don't relate to encryption.