VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 31–40 of 195

Q31

Which service does VMware Carbon Black Application Control use for policy enforcement?

  • A File Integrity Monitoring
  • B Endpoint Detection and Response
  • C Application Control Policies
  • D Access Control Lists
Explanation Application Control Policies enforce policies at the endpoint while others do not.
Q32

A company needs to restrict executable files from external sources. What should they implement?

  • A User Account Control
  • B Application Whitelisting
  • C Firewall Rules
  • D Network Segmentation
Explanation Application Whitelisting allows only approved executables.
Q33

You are configuring integration with a SIEM tool. What must be enabled first?

  • A API Access
  • B Log Data Control
  • C User Roles
  • D Incident Response
Explanation API Access must be enabled for SIEM tool integration, while other options are unrelated.
Q34

Which service is responsible for maintaining the policy enforcement in VMware Carbon Black Application Control?

  • A Policy Service
  • B Event Service
  • C Threat Intelligence
  • D Reporting Service
Explanation The Policy Service ensures your enforcement policies are applied; the other options focus on different functionalities.
Q35

A company needs to allow specific software while preventing all other applications. What should they configure in VMware Carbon Black Application Control?

  • A Deny All Policy
  • B Allow All Policy
  • C Policy Exceptions
  • D Whitelist Configuration
Explanation A Whitelist Configuration allows specified applications while blocking others; the Deny and Allow options are not specific enough.
Q36

You are configuring the Application Control's file integrity checking features. What happens when a known good file's hash is updated?

  • A It causes a policy violation.
  • B The file will be automatically blocked.
  • C The file is still allowed.
  • D It triggers a real-time threat alert.
Explanation The file is allowed if its hash is previously recognized; other options incorrectly suggest actions based on perceptive changes.
Q37

Which service in VMware Carbon Black manages application control policies?

  • A Application Control
  • B Endpoint Protection
  • C Device Control
  • D Threat Intelligence
Explanation Application Control is specifically designed for managing policies, while the others serve different security functions.
Q38

A company needs to allow a specific application but restrict all others; which policy should they configure in Carbon Black?

  • A Block Policy
  • B Allow Policy
  • C Audit Policy
  • D Default Policy
Explanation An Allow Policy permits specified applications while blocking others, unlike the others that serve broader purposes.
Q39

What happens when an unapproved application attempts to run on a system protected by Carbon Black?

  • A It automatically uninstalls
  • B It is blocked according to policy
  • C It runs with warnings
  • D Nothing happens; it's ignored
Explanation Carbon Black blocks any unapproved applications based on set policies to ensure security.
Q40

Which service in VMware Carbon Black provides real-time visibility into endpoint activity?

  • A Event Monitoring
  • B Threat Analysis
  • C Application Control
  • D Incident Response
Explanation Event Monitoring provides real-time visibility into endpoint activity, while others focus on specific aspects of security.