A company needs to prevent unauthorized software installation. What should they implement?
ASoftware Inventory Management
BApplication Whitelisting
CFirewall Rules
DNetwork Segmentation
Explanation
Application Whitelisting is essential for preventing unauthorized software, whereas the other options address different security aspects.
Q132
You are configuring Carbon Black policies. What occurs if an unknown application attempts to run?
AApplication is blocked by default
BApplication runs without restriction
CApplication is logged only
DUser is prompted for approval
Explanation
By default, unknown applications are blocked to maintain security, while other options suggest actions that do not align with default settings.
Q133
Which service accelerates visibility in VMware Carbon Black?
AThreat Intelligence Cloud
BVMware vSphere
CWorkspace ONE
DNSX-T Data Center
Explanation
Threat Intelligence Cloud provides essential threat data to enhance visibility; the others do not focus on threat visibility.
Q134
A company needs to integrate VMware Carbon Black with an Active Directory. What should they configure?
AAPI credentials
BGroup Policy Objects
CDomain controllers
DSingle sign-on
Explanation
API credentials are required for integration; the other options are not directly related to Carbon Black's integration process.
Q135
What happens when a policy is marked as 'strict' in VMware Carbon Black?
AAll executables are blocked
BOnly approved applications run
CAlerts for every action
DNo impact on system behavior
Explanation
A 'strict' policy allows only approved applications to execute, while the other options describe incorrect policy behaviors.
Q136
Which service allows for file integrity monitoring in VMware Carbon Black Application Control?
AFile Integrity Monitoring Service
BThreat Analysis Service
CEndpoint Detection Service
DApplication Control Service
Explanation
The File Integrity Monitoring Service captures changes in file states, while others serve different functions within Carbon Black.
Q137
A company needs to enforce application whitelisting. Which VMware Carbon Black feature should they use?
APolicy Management
BBehavioral Analysis
CReal-time File Cataloging
DContinuous Monitoring
Explanation
Policy Management allows setting and enforcing application whitelist criteria; others do not directly manage whitelisting rules.
Q138
What happens when an unsigned application attempt runs on a safeguarded endpoint?
AExecution is blocked
BExecution is allowed
CAlert is raised only
DSystem restarts
Explanation
Unsigned applications are blocked in a secured environment, whereas alerts or allowed execution doesn't align with whitelisting principles.
Q139
Which service is responsible for monitoring application integrity in VMware Carbon Black?
AApplication Control
BThreat Analysis
CEndpoint Detection
DLog Management
Explanation
Application Control specifically monitors application integrity, while others focus on different security aspects.
Q140
A company needs to create an allow list for a new application. What must they do first?
AScan the application's files
BConfigure endpoint policies
CIdentify application behaviors
DCreate a threat profile
Explanation
Identifying application behaviors is crucial before allowing it, while others are not prerequisites for allow listing.