VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 195

Q131

A company needs to prevent unauthorized software installation. What should they implement?

  • A Software Inventory Management
  • B Application Whitelisting
  • C Firewall Rules
  • D Network Segmentation
Explanation Application Whitelisting is essential for preventing unauthorized software, whereas the other options address different security aspects.
Q132

You are configuring Carbon Black policies. What occurs if an unknown application attempts to run?

  • A Application is blocked by default
  • B Application runs without restriction
  • C Application is logged only
  • D User is prompted for approval
Explanation By default, unknown applications are blocked to maintain security, while other options suggest actions that do not align with default settings.
Q133

Which service accelerates visibility in VMware Carbon Black?

  • A Threat Intelligence Cloud
  • B VMware vSphere
  • C Workspace ONE
  • D NSX-T Data Center
Explanation Threat Intelligence Cloud provides essential threat data to enhance visibility; the others do not focus on threat visibility.
Q134

A company needs to integrate VMware Carbon Black with an Active Directory. What should they configure?

  • A API credentials
  • B Group Policy Objects
  • C Domain controllers
  • D Single sign-on
Explanation API credentials are required for integration; the other options are not directly related to Carbon Black's integration process.
Q135

What happens when a policy is marked as 'strict' in VMware Carbon Black?

  • A All executables are blocked
  • B Only approved applications run
  • C Alerts for every action
  • D No impact on system behavior
Explanation A 'strict' policy allows only approved applications to execute, while the other options describe incorrect policy behaviors.
Q136

Which service allows for file integrity monitoring in VMware Carbon Black Application Control?

  • A File Integrity Monitoring Service
  • B Threat Analysis Service
  • C Endpoint Detection Service
  • D Application Control Service
Explanation The File Integrity Monitoring Service captures changes in file states, while others serve different functions within Carbon Black.
Q137

A company needs to enforce application whitelisting. Which VMware Carbon Black feature should they use?

  • A Policy Management
  • B Behavioral Analysis
  • C Real-time File Cataloging
  • D Continuous Monitoring
Explanation Policy Management allows setting and enforcing application whitelist criteria; others do not directly manage whitelisting rules.
Q138

What happens when an unsigned application attempt runs on a safeguarded endpoint?

  • A Execution is blocked
  • B Execution is allowed
  • C Alert is raised only
  • D System restarts
Explanation Unsigned applications are blocked in a secured environment, whereas alerts or allowed execution doesn't align with whitelisting principles.
Q139

Which service is responsible for monitoring application integrity in VMware Carbon Black?

  • A Application Control
  • B Threat Analysis
  • C Endpoint Detection
  • D Log Management
Explanation Application Control specifically monitors application integrity, while others focus on different security aspects.
Q140

A company needs to create an allow list for a new application. What must they do first?

  • A Scan the application's files
  • B Configure endpoint policies
  • C Identify application behaviors
  • D Create a threat profile
Explanation Identifying application behaviors is crucial before allowing it, while others are not prerequisites for allow listing.