VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 41–50 of 195

Q41

A company needs to apply security policies to a specific subset of applications. What should they use in Carbon Black?

  • A Policy Management
  • B Global Settings
  • C User Groups
  • D Application Rules
Explanation Policy Management allows targeted application of security policies, whereas the others serve broader configuration purposes.
Q42

What happens when an unapproved application attempts to execute in a Carbon Black-protected environment?

  • A Execution is allowed by default.
  • B It immediately quarantines the machine.
  • C Execution is blocked based on policy.
  • D It logs but allows execution.
Explanation Execution is blocked based on policy unless explicitly allowed, ensuring security integrity.
Q43

Which service configures application control policies in VMware Carbon Black?

  • A Application Control Management Service
  • B Threat Intelligence Service
  • C Endpoint Protection Service
  • D Security Analytics Service
Explanation The Application Control Management Service centrally manages policies; others do not handle policy configurations.
Q44

A company needs to blacklist a specific application across all endpoints. What is the best practice to achieve this without delay?

  • A Use a rejection policy immediately
  • B Manually remove the application from each device
  • C Create a global rule to blacklist it
  • D Contact VMware support for enforcement
Explanation Creating a global rule efficiently blacklists the application; manual removal and contacting support are not optimal solutions.
Q45

You are configuring a new application control policy. What happens when you add a detection rule for a known application?

  • A The application will be blocked immediately
  • B The application is allowed by default
  • C Detection rules don't affect policy execution
  • D Policies must be reapplied manually
Explanation Known applications not specifically blocked are allowed by default, ensuring operations continue smoothly until specified otherwise.
Q46

What action does VMware Carbon Black Application Control take for untrusted application execution?

  • A Blocks the execution immediately
  • B Allows execution with warnings
  • C Logs the execution attempt
  • D Prompts user for confirmation
Explanation Untrusted applications are blocked immediately to prevent potential threats, while the other options offer less secure measures.
Q47

A company needs to allow specific applications while blocking all others. Which feature should they utilize in VMware Carbon Black Application Control?

  • A Application Whitelisting
  • B Threat Detection
  • C Behavioral Analysis
  • D User Access Control
Explanation Application Whitelisting allows only approved applications to run, while the others deal with different security aspects.
Q48

You are configuring a new policy in VMware Carbon Black Application Control. What happens if a rule conflicts with an existing policy?

  • A The latter policy takes precedence
  • B Both policies are logged and ignored
  • C The first policy takes precedence
  • D A warning is issued to the admin
Explanation The latter policy typically takes precedence, which can lead to confusion if not managed well, unlike the other options that do not reflect the functionality.
Q49

Which service is integral to monitoring file integrity in Carbon Black Application Control?

  • A File Integrity Monitoring
  • B User Activity Monitoring
  • C Network Traffic Analysis
  • D Application Performance Management
Explanation File Integrity Monitoring ensures files’ integrity, while others focus on different aspects of system monitoring.
Q50

A company needs to restrict users from launching unauthorized applications. What should be configured?

  • A Predefined Policies
  • B Access Control List
  • C Application Control Policies
  • D License Monitoring
Explanation Application Control Policies specifically prevent unauthorized applications from launching, while others do not serve this purpose.