VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 21–30 of 195

Q21

What happens when a user attempts to run an application not authorized in the Carbon Black policy?

  • A The application runs without restrictions
  • B The application gets reported only
  • C The application is blocked from execution
  • D The application is logged as safe
Explanation Unauthorized applications are blocked from execution to ensure security.
Q22

Which service in VMware Carbon Black focuses on application visibility?

  • A Application Control
  • B Threat Detection
  • C Incident Response
  • D Data Analytics
Explanation Application Control specifically monitors and provides insights on application usage, while others focus on security threats or data analysis.
Q23

A company needs to ensure only approved applications run on its endpoints. What VLAN approach is most appropriate?

  • A Isolated VLAN for unmanaged applications
  • B Monitoring VLAN for all traffic
  • C Approval VLAN for approved applications
  • D Public VLAN for all users
Explanation An Approval VLAN would enforce running only permitted applications, while the others do not ensure application compliance.
Q24

You are configuring file integrity monitoring in Carbon Black. What happens when a monitored file is altered?

  • A No alert is generated
  • B An alert is triggered
  • C The file is automatically restored
  • D User access is denied
Explanation Altering a monitored file generates an alert to notify of potential unauthorized changes, whereas others incorrectly imply inaction or user restrictions.
Q25

Which service in VMware Carbon Black monitors file integrity?

  • A File Integrity Monitoring
  • B Threat Intelligence
  • C Endpoint Detection
  • D Application Whitelisting
Explanation File Integrity Monitoring tracks changes to files, while the others focus on different security aspects.
Q26

A company needs to prevent unauthorized software execution. What Carbon Black feature should they use?

  • A Application Control policies
  • B Threat Hunting
  • C Log indexing
  • D Incident Response
Explanation Application Control policies enforce rules on software execution to prevent unauthorized applications.
Q27

You are configuring a policy in Carbon Black. What happens if a file is not explicitly listed in a whitelisting policy?

  • A The file is allowed to run.
  • B The file is blocked.
  • C The file prompts for permission.
  • D The file is quarantined automatically.
Explanation In whitelisting, any file not explicitly allowed is automatically blocked for execution.
Q28

Which service is responsible for defining policies in VMware Carbon Black Application Control?

  • A Policy management service
  • B Database service
  • C Event processing service
  • D User management service
Explanation Policy management service defines application control policies, while the others pertain to different functions.
Q29

A company needs to enforce application whitelisting. What is the first step?

  • A Install the whitelisting tool
  • B Create a secure policy
  • C Identify approved applications
  • D Deploy agents on endpoints
Explanation Identifying approved applications is essential before creating a policy.
Q30

You are configuring the integration settings in VMware Carbon Black Application Control. What happens when you enable 'email notifications'?

  • A Users receive log reports
  • B Admin gets alerts for policy changes
  • C System updates are notified
  • D Alerts for application block events
Explanation Enabling email notifications sends alerts for application blocks, not the other options.