A company needs to apply security policies to a specific subset of applications. What should they use in Carbon Black?
APolicy Management
BGlobal Settings
CUser Groups
DApplication Rules
Explanation
Policy Management allows targeted application of security policies, whereas the others serve broader configuration purposes.
Q42
What happens when an unapproved application attempts to execute in a Carbon Black-protected environment?
AExecution is allowed by default.
BIt immediately quarantines the machine.
CExecution is blocked based on policy.
DIt logs but allows execution.
Explanation
Execution is blocked based on policy unless explicitly allowed, ensuring security integrity.
Q43
Which service configures application control policies in VMware Carbon Black?
AApplication Control Management Service
BThreat Intelligence Service
CEndpoint Protection Service
DSecurity Analytics Service
Explanation
The Application Control Management Service centrally manages policies; others do not handle policy configurations.
Q44
A company needs to blacklist a specific application across all endpoints. What is the best practice to achieve this without delay?
AUse a rejection policy immediately
BManually remove the application from each device
CCreate a global rule to blacklist it
DContact VMware support for enforcement
Explanation
Creating a global rule efficiently blacklists the application; manual removal and contacting support are not optimal solutions.
Q45
You are configuring a new application control policy. What happens when you add a detection rule for a known application?
AThe application will be blocked immediately
BThe application is allowed by default
CDetection rules don't affect policy execution
DPolicies must be reapplied manually
Explanation
Known applications not specifically blocked are allowed by default, ensuring operations continue smoothly until specified otherwise.
Q46
What action does VMware Carbon Black Application Control take for untrusted application execution?
ABlocks the execution immediately
BAllows execution with warnings
CLogs the execution attempt
DPrompts user for confirmation
Explanation
Untrusted applications are blocked immediately to prevent potential threats, while the other options offer less secure measures.
Q47
A company needs to allow specific applications while blocking all others. Which feature should they utilize in VMware Carbon Black Application Control?
AApplication Whitelisting
BThreat Detection
CBehavioral Analysis
DUser Access Control
Explanation
Application Whitelisting allows only approved applications to run, while the others deal with different security aspects.
Q48
You are configuring a new policy in VMware Carbon Black Application Control. What happens if a rule conflicts with an existing policy?
AThe latter policy takes precedence
BBoth policies are logged and ignored
CThe first policy takes precedence
DA warning is issued to the admin
Explanation
The latter policy typically takes precedence, which can lead to confusion if not managed well, unlike the other options that do not reflect the functionality.
Q49
Which service is integral to monitoring file integrity in Carbon Black Application Control?
AFile Integrity Monitoring
BUser Activity Monitoring
CNetwork Traffic Analysis
DApplication Performance Management
Explanation
File Integrity Monitoring ensures files’ integrity, while others focus on different aspects of system monitoring.
Q50
A company needs to restrict users from launching unauthorized applications. What should be configured?
APredefined Policies
BAccess Control List
CApplication Control Policies
DLicense Monitoring
Explanation
Application Control Policies specifically prevent unauthorized applications from launching, while others do not serve this purpose.