VMware
Carbon Black Application Control Technical Specialist
250-600
Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.
195 questions
0 views
Free
Questions 101–110 of 195
A company needs to ensure only approved applications run on its servers. Which configuration is essential?
-
A
Configure application policies
-
B
Disable log monitoring
-
C
Implement network firewalls
-
D
Enhance user permissions
Explanation
Configuring application policies ensures only approved software runs; other options do not enforce execution controls.
What happens when you set a policy to 'Deny' for an application in Carbon Black Application Control?
-
A
Application runs normally
-
B
Application is blocked
-
C
Policy is ignored
-
D
System crashes on launch
Explanation
A 'Deny' policy actively blocks the application; the other options misinterpret policy actions.
Which service is responsible for monitoring file integrity in Carbon Black?
-
A
File Integrity Monitor
-
B
Threat Detection Service
-
C
Application Whitelisting Service
-
D
Data Loss Prevention Service
Explanation
File Integrity Monitor tracks changes to files, while the other options do not focus specifically on this aspect.
A company needs to ensure certain applications are always allowed to run. What should they implement in Carbon Black?
-
A
Application Blacklisting
-
B
Application Whitelisting
-
C
File Integrity Monitoring
-
D
Endpoint Detection and Response
Explanation
Application Whitelisting allows specific applications to run while blocking others, unlike the blacklisting approach.
What happens when a rule in Carbon Black is violated?
-
A
The application is automatically deleted
-
B
An alert is generated
-
C
No action is taken
-
D
The endpoint is immediately disconnected
Explanation
When a rule is violated, an alert is generated to notify admins instead of taking immediate drastic action.
Which service in VMware Carbon Black Application Control ensures executable binaries are properly whitelisted?
-
A
Application Control
-
B
Threat Intelligence
-
C
Endpoint Detection
-
D
Remediation Solutions
Explanation
Application Control specifically manages whitelisting, while others focus on different security capabilities.
A company needs to block unapproved applications on their endpoints. What should they implement?
-
A
Automated Patching
-
B
Policy Management
-
C
Firewall Rules
-
D
Network Segmentation
Explanation
Policy Management allows specifically controlling application usage, unlike the other options.
What happens when a user tries to run a blocked application in a Carbon Black Application Control environment?
-
A
Application launches normally.
-
B
User receives alert notification.
-
C
Application is allowed after reconfiguration.
-
D
Application's installation is auto-reversed.
Explanation
Users encounter alert notifications for blocked applications, ensuring security policies are enforced.
Which service monitors system integrity in VMware Carbon Black?
-
A
File Integrity Monitoring
-
B
Real-time Threat Detection
-
C
User Behavior Analytics
-
D
Data Loss Prevention
Explanation
File Integrity Monitoring verifies file changes, not threat detection or user behavior.
A company needs to apply a policy to prevent unauthorized applications from running. What should they use?
-
A
Application Control
-
B
Endpoint Detection
-
C
Cloud Security
-
D
Network Firewall
Explanation
Application Control specifically prevents unauthorized applications, unlike the other options.