What happens when a user tries to run a blocked application in Carbon Black?
AApplication runs with warnings
BApplication is blocked and logged
CApplication opens in safe mode
DUser is automatically notified
Explanation
Blocked applications are prevented from running, and this action is logged for security oversight, while others are incorrect behaviors.
Q52
A user needs to ensure only approved applications run on endpoints. Which feature of VMware Carbon Black Application Control achieves this?
AApplication blacklisting
BApplication whitelisting
CReal-time monitoring
DIntrusion detection
Explanation
Application whitelisting allows only approved applications to run, while blacklisting prevents specified ones.
Q53
You are configuring a new policy for application control. What happens when the policy is set to 'Monitor' mode?
ABlocks all unapproved applications
BLogs attempts to run unapproved applications
CAutomatically approves new applications
DDeletes unapproved applications immediately
Explanation
Monitor mode logs but does not block unapproved applications; it observes user actions.
Q54
A company has strict compliance requirements and needs to ensure only company-approved software runs. Which feature should they enable for compliance reporting?
AIncident response
BApplication control auditing
CFirewall logging
DUser behavior analytics
Explanation
Application control auditing tracks and reports compliance with application policies, while the others do not directly pertain to application approval.
Q55
Which service in VMware Carbon Black Application Control is responsible for policy enforcement?
APolicy Administration Service
BData Collection Service
CAgent Endpoint Service
DMonitoring Service
Explanation
The Policy Administration Service enforces security policies, while others focus on logging, agent management, or data collection.
Q56
You are configuring file integrity monitoring. What is the primary consideration?
AFile size restrictions
BMonitoring frequency
CType of files monitored
DPermissions of users
Explanation
Focusing on the types of files ensures relevant changes are tracked, while others affect performance or usability indirectly.
Q57
What happens when a process is not allowed by a policy?
AThe process is permitted anyway
BThe process is blocked
CThe system crashes
DAn alert is ignored
Explanation
The policy enforcement results in the blocking of unauthorized processes, ensuring system security.
Q58
Which service provides real-time threat visibility in VMware Carbon Black?
AThreat Analysis
BSecurity Analytics
CEvent Monitoring
DData Management
Explanation
Security Analytics provides real-time insight into threats, while others focus on different aspects of security management.
Q59
A company needs to implement strict controls on application execution. What should they enable to enforce this policy?
AApplication Control
BData Loss Prevention
CNetwork Segmentation
DFirewall Rules
Explanation
Application Control specifically governs application execution, unlike the other options which serve different purposes.
Q60
You are configuring a policy in Carbon Black. What happens when a policy is set with a block rule and a process matches this rule?
AProcess is allowed to execute
BProcess is logged as informational
CProcess execution is denied
DProcess runs in a sandbox
Explanation
A block rule explicitly denies any matching process execution, while other options imply a less restrictive outcome.