You are configuring Carbon Black and encounter a unique file type. What should you check to maintain security?
AThe file type's reputation
BSystem resource usage
CUser permissions
DNetwork settings
Explanation
Checking the file type's reputation is essential for assessing its security risks, unlike the other options which relate to system performance or access controls.
Q142
Which service is primarily responsible for monitoring system changes in VMware Carbon Black?
AIntegrity Monitoring
BThreat Intelligence
CIncident Response
DEndpoint Protection
Explanation
Integrity Monitoring captures and logs system changes, while the other options serve different purposes.
Q143
A company needs to enforce a strict application control policy. What should they use to manage application whitelisting?
AFile Integrity Monitoring
BApplication Control Policy
CBasic Firewall Rules
DUser Permissions
Explanation
An Application Control Policy specifically manages whitelisting; others do not focus on this functionality.
Q144
What happens when a previously trusted application is updated outside of approved channels?
AIt remains trusted and runs normally.
BIt is automatically removed from the system.
CIt becomes untrusted until re-approved.
DIt is flagged for user review only.
Explanation
The application becomes untrusted to maintain security, as the update is not approved.
Q145
Which feature of VMware Carbon Black Application Control helps restrict unauthorized application execution?
AAllowlisting
BSandboxing
CVirtual Machine Isolation
DEncryption
Explanation
Allowlisting explicitly permits only known applications, preventing unauthorized execution. The other options do not serve to restrict execution in the same way.
Q146
A company needs to ensure that only signed versions of applications can run. What should they configure?
ABlocklisting
BTrust Store
CVMWare vSphere
DApplication Server
Explanation
The Trust Store allows verification of application signatures; other options do not enforce signature checks.
Q147
What happens when an application is detected in the block list during startup?
AApplication starts normally
BSystem reboots
CApplication execution is prevented
DApplication runs in a restricted mode
Explanation
Detected applications from the block list are prevented from executing, while other options do not accurately describe the behavior.
Q148
Which service provides application control and integrity monitoring?
AVMware Carbon Black Application Control
BVMware vSphere Network Security
CVMware NSX Load Balancer
DVMware Tanzu Kubernetes Service
Explanation
Carbon Black Application Control is designed for application monitoring and control, while the others serve different security functions.
Q149
A company needs to ensure that only authorized applications can run. What should they implement?
AApplication whitelisting
BNetwork segmentation
CUser access control
DData encryption
Explanation
Application whitelisting allows only approved applications to execute, while the other options focus on different aspects of security.
Q150
You are configuring application control policies. What happens when an application is not on the approved list?
AThe application runs with warnings
BThe application is blocked from starting
CThe application requests permission
DThe application is logged for review
Explanation
If an application is unapproved, it is blocked from executing, whereas the other choices incorrectly suggest alternate behaviors.