VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 171–180 of 195

Q171

You are configuring the blacklist in VMware Carbon Black. What happens when you add a process to the blacklist?

  • A The process is monitored only.
  • B The process immediately executes.
  • C The process is prevented from running.
  • D The process is automatically deleted.
Explanation Adding a process to the blacklist prevents its execution, while others do not.
Q172

Which service in VMware Carbon Black Application Control helps in preventing unauthorized application execution?

  • A Application Control
  • B Threat Intelligence
  • C Endpoint Detection
  • D File Integrity Monitoring
Explanation Application Control specifically prevents unauthorized application execution, while others focus on detection or monitoring.
Q173

A company needs to restrict installation of unauthorized software. What should they utilize within VMware Carbon Black?

  • A Whitelist Policies
  • B Blacklisting
  • C User Behavior Analytics
  • D Incident Response
Explanation Whitelist Policies allow only approved software, directly supporting the goal of restricting unauthorized installations.
Q174

You are configuring a sensor in Carbon Black. What happens if the sensor fails to connect to the server?

  • A It stops protection immediately.
  • B It operates in a limited state.
  • C It sends an alert to admins.
  • D It continues with previous policies.
Explanation If a sensor fails to connect, it runs in a limited state, still providing basic protection based on previous policies.
Q175

Which service is responsible for monitoring application integrity in VMware Carbon Black?

  • A Application Control
  • B Endpoint Detection
  • C Incident Response
  • D Threat Intelligence
Explanation Application Control ensures application integrity, while others serve different security functions.
Q176

A company needs to ensure that only approved applications can run on endpoints. What should they configure?

  • A Threat Intelligence feeds
  • B Application Control policies
  • C Incident Response plans
  • D Host firewall settings
Explanation Application Control policies restrict app execution to approved applications, whereas others do not address application approval directly.
Q177

What happens when an unauthorized application attempts to execute under Carbon Black policies?

  • A It is allowed to execute.
  • B Execution is blocked.
  • C A notification is sent.
  • D It is logged for review.
Explanation Unauthorized applications are blocked from executing to maintain security, while others do not stop execution directly.
Q178

Which service allows for monitoring application changes in VMware Carbon Black?

  • A Application Control
  • B Threat Detection
  • C Log Insight
  • D Cloud Security
Explanation Application Control specifically tracks changes made to applications, while the others serve different purposes.
Q179

A company needs to restrict the execution of unauthorized applications. What VMware Carbon Black feature should they utilize?

  • A File Integrity Monitoring
  • B Policy Management
  • C Threat Intelligence
  • D Endpoint Detection
Explanation Policy Management can define rules for application execution while the others address different security aspects.
Q180

What happens when an endpoint is in a quarantine state in VMware Carbon Black?

  • A Application updates can still occur
  • B User access is completely blocked
  • C Threats are automatically removed
  • D Execution of whitelisted apps is halted
Explanation A quarantined endpoint restricts user access until resolved, while the others incorrectly describe endpoint behavior.