VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 141–150 of 195

Q141

You are configuring Carbon Black and encounter a unique file type. What should you check to maintain security?

  • A The file type's reputation
  • B System resource usage
  • C User permissions
  • D Network settings
Explanation Checking the file type's reputation is essential for assessing its security risks, unlike the other options which relate to system performance or access controls.
Q142

Which service is primarily responsible for monitoring system changes in VMware Carbon Black?

  • A Integrity Monitoring
  • B Threat Intelligence
  • C Incident Response
  • D Endpoint Protection
Explanation Integrity Monitoring captures and logs system changes, while the other options serve different purposes.
Q143

A company needs to enforce a strict application control policy. What should they use to manage application whitelisting?

  • A File Integrity Monitoring
  • B Application Control Policy
  • C Basic Firewall Rules
  • D User Permissions
Explanation An Application Control Policy specifically manages whitelisting; others do not focus on this functionality.
Q144

What happens when a previously trusted application is updated outside of approved channels?

  • A It remains trusted and runs normally.
  • B It is automatically removed from the system.
  • C It becomes untrusted until re-approved.
  • D It is flagged for user review only.
Explanation The application becomes untrusted to maintain security, as the update is not approved.
Q145

Which feature of VMware Carbon Black Application Control helps restrict unauthorized application execution?

  • A Allowlisting
  • B Sandboxing
  • C Virtual Machine Isolation
  • D Encryption
Explanation Allowlisting explicitly permits only known applications, preventing unauthorized execution. The other options do not serve to restrict execution in the same way.
Q146

A company needs to ensure that only signed versions of applications can run. What should they configure?

  • A Blocklisting
  • B Trust Store
  • C VMWare vSphere
  • D Application Server
Explanation The Trust Store allows verification of application signatures; other options do not enforce signature checks.
Q147

What happens when an application is detected in the block list during startup?

  • A Application starts normally
  • B System reboots
  • C Application execution is prevented
  • D Application runs in a restricted mode
Explanation Detected applications from the block list are prevented from executing, while other options do not accurately describe the behavior.
Q148

Which service provides application control and integrity monitoring?

  • A VMware Carbon Black Application Control
  • B VMware vSphere Network Security
  • C VMware NSX Load Balancer
  • D VMware Tanzu Kubernetes Service
Explanation Carbon Black Application Control is designed for application monitoring and control, while the others serve different security functions.
Q149

A company needs to ensure that only authorized applications can run. What should they implement?

  • A Application whitelisting
  • B Network segmentation
  • C User access control
  • D Data encryption
Explanation Application whitelisting allows only approved applications to execute, while the other options focus on different aspects of security.
Q150

You are configuring application control policies. What happens when an application is not on the approved list?

  • A The application runs with warnings
  • B The application is blocked from starting
  • C The application requests permission
  • D The application is logged for review
Explanation If an application is unapproved, it is blocked from executing, whereas the other choices incorrectly suggest alternate behaviors.