VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 121–130 of 195

Q121

Which service in VMware Carbon Black Application Control conducts file integrity monitoring?

  • A File Integrity Monitoring Service
  • B Security Monitoring Service
  • C Threat Analysis Service
  • D Endpoint Protection Service
Explanation File Integrity Monitoring Service is specifically designed for this function; others focus on different types of monitoring.
Q122

A company needs to allow a new application but wants to restrict unauthorized changes. How should they configure VMware Carbon Black Application Control?

  • A Enable blocking policy
  • B Create a whitelist rule
  • C Set up a vulnerability scan
  • D Deploy real-time alerts
Explanation Creating a whitelist rule allows the specific application while restricting others; blocking policies would prevent the app entirely.
Q123

What happens when an unauthorized change is made to a whitelisted application?

  • A The application automatically updates
  • B A notification is sent
  • C The change is allowed immediately
  • D Access to the application is revoked
Explanation A notification is generated for unauthorized changes, while the other options describe incorrect behavior in standard configurations.
Q124

Which service is utilized for monitoring application runtime integrity?

  • A Application Control Monitoring
  • B Endpoint Protection Service
  • C Threat Intelligence Service
  • D File Execution Service
Explanation Application Control Monitoring verifies the integrity of applications, while the others serve different purposes.
Q125

A company needs to restrict the execution of unapproved scripts. What should they configure in Carbon Black Application Control?

  • A File Integrity Monitoring
  • B Application Control Policies
  • C Threat Detection Rules
  • D Behavioral Analysis Settings
Explanation Application Control Policies specifically manage execution rights for applications, as the other options relate to different aspects of security.
Q126

What happens when a user tries to run an application not listed in the allow list?

  • A Application launches successfully
  • B Application is blocked from starting
  • C User receives an alert
  • D Application runs with reduced functionality
Explanation Applications not in the allow list are blocked, while the other responses do not reflect the system's response accurately.
Q127

Which service helps monitor the integrity of files?

  • A File Integrity Monitoring
  • B Data Loss Prevention
  • C User Behavior Analytics
  • D Network Traffic Analysis
Explanation File Integrity Monitoring tracks changes to files; others focus on different security aspects.
Q128

A company needs to ensure only approved applications run. Which approach should they take?

  • A Implement a whitelist policy
  • B Disable all application execution
  • C Enforce a blacklist policy
  • D Rotate application access passwords
Explanation A whitelist policy allows only approved applications, unlike blacklisting which can still allow unapproved ones.
Q129

What happens when an application is blocked by Carbon Black?

  • A It is automatically removed from the device
  • B User receives a warning but can proceed
  • C The application remains inactive and logged
  • D It triggers a system-wide lockdown
Explanation Blocked applications remain inactive but are logged for audit purposes, rather than removed or causing lockdowns.
Q130

Which service in VMware Carbon Black Application Control helps manage binaries?

  • A Binary Approval Service
  • B Policy Management Service
  • C Threat Detection Service
  • D Data Analytics Service
Explanation The Binary Approval Service is specifically designed for managing and approving binaries, unlike the other services which focus on different operational aspects.