Which service in VMware Carbon Black Application Control conducts file integrity monitoring?
AFile Integrity Monitoring Service
BSecurity Monitoring Service
CThreat Analysis Service
DEndpoint Protection Service
Explanation
File Integrity Monitoring Service is specifically designed for this function; others focus on different types of monitoring.
Q122
A company needs to allow a new application but wants to restrict unauthorized changes. How should they configure VMware Carbon Black Application Control?
AEnable blocking policy
BCreate a whitelist rule
CSet up a vulnerability scan
DDeploy real-time alerts
Explanation
Creating a whitelist rule allows the specific application while restricting others; blocking policies would prevent the app entirely.
Q123
What happens when an unauthorized change is made to a whitelisted application?
AThe application automatically updates
BA notification is sent
CThe change is allowed immediately
DAccess to the application is revoked
Explanation
A notification is generated for unauthorized changes, while the other options describe incorrect behavior in standard configurations.
Q124
Which service is utilized for monitoring application runtime integrity?
AApplication Control Monitoring
BEndpoint Protection Service
CThreat Intelligence Service
DFile Execution Service
Explanation
Application Control Monitoring verifies the integrity of applications, while the others serve different purposes.
Q125
A company needs to restrict the execution of unapproved scripts. What should they configure in Carbon Black Application Control?
AFile Integrity Monitoring
BApplication Control Policies
CThreat Detection Rules
DBehavioral Analysis Settings
Explanation
Application Control Policies specifically manage execution rights for applications, as the other options relate to different aspects of security.
Q126
What happens when a user tries to run an application not listed in the allow list?
AApplication launches successfully
BApplication is blocked from starting
CUser receives an alert
DApplication runs with reduced functionality
Explanation
Applications not in the allow list are blocked, while the other responses do not reflect the system's response accurately.
Q127
Which service helps monitor the integrity of files?
AFile Integrity Monitoring
BData Loss Prevention
CUser Behavior Analytics
DNetwork Traffic Analysis
Explanation
File Integrity Monitoring tracks changes to files; others focus on different security aspects.
Q128
A company needs to ensure only approved applications run. Which approach should they take?
AImplement a whitelist policy
BDisable all application execution
CEnforce a blacklist policy
DRotate application access passwords
Explanation
A whitelist policy allows only approved applications, unlike blacklisting which can still allow unapproved ones.
Q129
What happens when an application is blocked by Carbon Black?
AIt is automatically removed from the device
BUser receives a warning but can proceed
CThe application remains inactive and logged
DIt triggers a system-wide lockdown
Explanation
Blocked applications remain inactive but are logged for audit purposes, rather than removed or causing lockdowns.
Q130
Which service in VMware Carbon Black Application Control helps manage binaries?
ABinary Approval Service
BPolicy Management Service
CThreat Detection Service
DData Analytics Service
Explanation
The Binary Approval Service is specifically designed for managing and approving binaries, unlike the other services which focus on different operational aspects.