VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 1–10 of 195

Q1

Which service in VMware Carbon Black Application Control allows you to create policies for application usage?

  • A Policy Management
  • B Application Governance
  • C System Integrity
  • D Incident Response
Explanation Policy Management is specifically designed for creating and applying policies about application usage, while others do not focus on this functionality.
Q2

A company needs to restrict the installation of unauthorized applications. What is the best approach using VMware Carbon Black Application Control?

  • A Enable Application Rules
  • B Disable User Access
  • C Uninstall Current Applications
  • D Enhance Network Security
Explanation Enabling Application Rules directly controls which applications can be installed, while the other options do not effectively restrict installations.
Q3

What happens when a user tries to run an application not covered by the current policies in VMware Carbon Black Application Control?

  • A Application runs normally
  • B User is prompted for approval
  • C Application is blocked
  • D The system crashes
Explanation Applications not covered by current policies are blocked to maintain security, while the other options do not reflect the expected actions in this scenario.
Q4

Which service provides application whitelisting in VMware Carbon Black?

  • A Application Control
  • B Threat Analysis
  • C Network Security
  • D User Behavior Analysis
Explanation Application Control specifically focuses on application whitelisting, while the others provide different security functions.
Q5

A company needs to allow a third-party software installer but want to restrict general internal installer use. What should they configure?

  • A Allow lists for both types
  • B Custom policy for vendors
  • C Global block policy
  • D Remove all installer access
Explanation Creating a custom policy for vendors allows allowed installations while restricting internal tools.
Q6

What happens when a blocked application attempts to run under Carbon Black?

  • A The application is allowed
  • B The user is notified
  • C The application is quarantined
  • D The application fails to execute
Explanation Blocked applications fail to execute entirely, thus ensuring compliance with security policies.
Q7

Which service is primarily responsible for monitoring unauthorized changes to files?

  • A File Integrity Monitoring
  • B Network Traffic Analysis
  • C User Behavior Analytics
  • D Endpoint Detection and Response
Explanation File Integrity Monitoring detects unauthorized file changes while others focus on different areas.
Q8

A company needs to restrict application usage for a specific department. Which feature should they implement?

  • A Whitelisting
  • B Sandboxing
  • C Virtualization
  • D Encryption
Explanation Whitelisting allows control over which applications are permitted; others serve different security purposes.
Q9

What happens when a file not on the whitelist is executed?

  • A The file executes normally
  • B Execution is blocked
  • C File is quarantined
  • D User receives an alert
Explanation Execution is blocked for unapproved files, while others imply alternatives not applicable under whitelisting rules.
Q10

You are configuring the Carbon Black Application Control server's communication settings. Which setting allows the server to communicate with endpoints over an encrypted channel?

  • A SSL/TLS Configuration
  • B User Authentication
  • C Policy Enforcement
  • D Session Management
Explanation SSL/TLS Configuration enables secure communication, while the others don't relate to encryption.