VMware

Carbon Black Application Control Technical Specialist

250-600

Prepare for the 250-600 exam to validate your skills in Carbon Black Application Control.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 81–90 of 195

Q81

A company needs to determine the impact of forcing a hardware change on the current application policy. What should they assess first?

  • A System compatibility with applications
  • B User feedback on performance
  • C Financial budget for changes
  • D Update frequency of applications
Explanation Assessing system compatibility is crucial to ensure the application policies will function correctly post-change, while other factors are secondary considerations.
Q82

Which service helps to monitor file integrity in VMware Carbon Black?

  • A File Integrity Monitoring (FIM)
  • B Event Process Analysis
  • C Cloud Security Posture Management
  • D Endpoint Detection and Response
Explanation File Integrity Monitoring (FIM) specifically checks for unauthorized changes, while others serve different purposes.
Q83

A company needs to enforce application control but also allow updates. What should they configure?

  • A Allow mode with scripts
  • B Custom policy with whitelist
  • C Block mode by default
  • D Audit mode only
Explanation Custom policy with whitelist allows updates while enforcing control, while others either block or do not enforce properly.
Q84

You are configuring a deployment with multiple hosts. What is critical to consider?

  • A Only the OS version on each host
  • B Network bandwidth between hosts
  • C Consistency of policy across hosts
  • D Geographical location of users
Explanation Consistency of policy across hosts ensures efficient and predictable behavior, while others are less critical for VMware Carbon Black.
Q85

Which of the following functions identifies and blocks unapproved applications?

  • A Application Control
  • B VMware Horizon
  • C NSX Distributed Firewall
  • D vSphere HA
Explanation Application Control is specifically designed to manage approved application lists, while the others focus on virtualization and networking.
Q86

A company needs to enforce compliance with application usage. Which Carbon Black feature would best accomplish this?

  • A Policy Management
  • B Network Segmentation
  • C Security Logs
  • D User Behavior Analytics
Explanation Policy Management allows enforcement of application use policies, while the other options provide different security functionalities.
Q87

You are configuring the Application Control layout. What happens when duplicate policies are encountered in the configuration?

  • A They cancel each other out.
  • B The last one saved takes precedence.
  • C An error is generated.
  • D All policies are ignored.
Explanation The last saved policy will take precedence over previously defined ones, while the other options misrepresent the actual behavior.
Q88

Which service is used to manage application control policies in VMware Carbon Black?

  • A Carbon Black Application Control Server
  • B Carbon Black Response
  • C VMware vCenter
  • D Carbon Black Threat Analysis
Explanation The Application Control Server manages policies, unlike the other services that serve different purposes.
Q89

A company needs to ensure that certain applications cannot be overwritten or replaced. Which feature in Carbon Black should they use?

  • A Application Locking
  • B Blacklist Policy
  • C Whitelisting
  • D Behavioral Monitoring
Explanation Application locking prevents changes, which blacklists and whitelists do not specifically do.
Q90

You are configuring file integrity monitoring in Carbon Black. What happens when a monitored file is modified?

  • A No action is taken
  • B An alert is generated
  • C The file is quarantined
  • D It automatically rolls back
Explanation File modifications trigger alerts, while antibacterial actions are not automatic or related to monitoring.