VMware
Carbon Black Application Control Technical Specialist
250-600
Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.
195 questions
0 views
Free
Questions 171–180 of 195
You are configuring the blacklist in VMware Carbon Black. What happens when you add a process to the blacklist?
-
A
The process is monitored only.
-
B
The process immediately executes.
-
C
The process is prevented from running.
-
D
The process is automatically deleted.
Explanation
Adding a process to the blacklist prevents its execution, while others do not.
Which service in VMware Carbon Black Application Control helps in preventing unauthorized application execution?
-
A
Application Control
-
B
Threat Intelligence
-
C
Endpoint Detection
-
D
File Integrity Monitoring
Explanation
Application Control specifically prevents unauthorized application execution, while others focus on detection or monitoring.
A company needs to restrict installation of unauthorized software. What should they utilize within VMware Carbon Black?
-
A
Whitelist Policies
-
B
Blacklisting
-
C
User Behavior Analytics
-
D
Incident Response
Explanation
Whitelist Policies allow only approved software, directly supporting the goal of restricting unauthorized installations.
You are configuring a sensor in Carbon Black. What happens if the sensor fails to connect to the server?
-
A
It stops protection immediately.
-
B
It operates in a limited state.
-
C
It sends an alert to admins.
-
D
It continues with previous policies.
Explanation
If a sensor fails to connect, it runs in a limited state, still providing basic protection based on previous policies.
Which service is responsible for monitoring application integrity in VMware Carbon Black?
-
A
Application Control
-
B
Endpoint Detection
-
C
Incident Response
-
D
Threat Intelligence
Explanation
Application Control ensures application integrity, while others serve different security functions.
A company needs to ensure that only approved applications can run on endpoints. What should they configure?
-
A
Threat Intelligence feeds
-
B
Application Control policies
-
C
Incident Response plans
-
D
Host firewall settings
Explanation
Application Control policies restrict app execution to approved applications, whereas others do not address application approval directly.
What happens when an unauthorized application attempts to execute under Carbon Black policies?
-
A
It is allowed to execute.
-
B
Execution is blocked.
-
C
A notification is sent.
-
D
It is logged for review.
Explanation
Unauthorized applications are blocked from executing to maintain security, while others do not stop execution directly.
Which service allows for monitoring application changes in VMware Carbon Black?
-
A
Application Control
-
B
Threat Detection
-
C
Log Insight
-
D
Cloud Security
Explanation
Application Control specifically tracks changes made to applications, while the others serve different purposes.
A company needs to restrict the execution of unauthorized applications. What VMware Carbon Black feature should they utilize?
-
A
File Integrity Monitoring
-
B
Policy Management
-
C
Threat Intelligence
-
D
Endpoint Detection
Explanation
Policy Management can define rules for application execution while the others address different security aspects.
What happens when an endpoint is in a quarantine state in VMware Carbon Black?
-
A
Application updates can still occur
-
B
User access is completely blocked
-
C
Threats are automatically removed
-
D
Execution of whitelisted apps is halted
Explanation
A quarantined endpoint restricts user access until resolved, while the others incorrectly describe endpoint behavior.