VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 61–70 of 195

Q61

Which service in VMware Carbon Black Application Control facilitates real-time monitoring of file integrity?

  • A File Integrity Monitoring
  • B Endpoint Protection
  • C Threat Detection
  • D Network Security
Explanation File Integrity Monitoring specifically checks for unauthorized changes to files, unlike the other services listed.
Q62

A company needs to prevent unauthorized execution of unapproved applications. What VMware Carbon Black feature should they use?

  • A Application Control policies
  • B VMware Horizon integration
  • C Network segmentation strategies
  • D User authentication schemes
Explanation Application Control policies ensure only approved applications can execute, while the other options don't directly address application execution.
Q63

What happens when implementing a block policy for an application in Carbon Black Application Control?

  • A The application is automatically whitelisted
  • B No action is taken
  • C The application is blocked from execution
  • D Users are notified of the block
Explanation A block policy explicitly prohibits the application from executing, whereas the other options do not align with the policy's intent.
Q64

Which service is critical for monitoring application integrity in VMware Carbon Black Application Control?

  • A Integrity Monitoring
  • B Network Security
  • C Incident Response
  • D Endpoint Detection
Explanation Integrity Monitoring ensures all applications are legitimate and unaltered; other services address different aspects of security.
Q65

A company needs to enhance software compliance and verification. Which feature should they use in Carbon Black Application Control?

  • A Policy Management
  • B Alerting
  • C Reporting
  • D File Hashing
Explanation Policy Management allows enforcing and verifying software compliance whereas others focus on different functionalities.
Q66

What happens when a file is deemed unsanctioned in Carbon Black Application Control?

  • A It is automatically removed
  • B It triggers a policy action
  • C It is added to a whitelist
  • D It bypasses all user permissions
Explanation Unsanctioned files trigger configured policy actions, while others represent incorrect or unrelated outcomes.
Q67

Which service in VMware Carbon Black helps identify known vulnerabilities?

  • A Vulnerability Management
  • B Incident Response
  • C Application Whitelisting
  • D Threat Hunting
Explanation Vulnerability Management identifies known vulnerabilities; the others focus on different aspects.
Q68

A company needs to ensure only approved applications run on their servers. What should they implement?

  • A Application Control
  • B Network Segmentation
  • C User Authentication
  • D Endpoint Encryption
Explanation Application Control restricts server operations to approved applications; the others do not achieve this goal.
Q69

You are configuring VMware Carbon Black to prevent certain scripts from executing. What happens when the software encounters a non-whitelisted script?

  • A Execution is blocked
  • B Script will run normally
  • C Script gets flagged for review
  • D No action is taken
Explanation Non-whitelisted scripts are blocked; the other options describe incorrect behaviors.
Q70

Which service does VMware Carbon Black Application Control utilize for integrity monitoring?

  • A File Integrity Monitoring
  • B Behavioral Threat Analysis
  • C Network Traffic Analysis
  • D Database Activity Monitoring
Explanation File Integrity Monitoring ensures file compatibility and security, while the other options focus on different aspects of threat detection.