A company needs to determine the impact of forcing a hardware change on the current application policy. What should they assess first?
ASystem compatibility with applications
BUser feedback on performance
CFinancial budget for changes
DUpdate frequency of applications
Explanation
Assessing system compatibility is crucial to ensure the application policies will function correctly post-change, while other factors are secondary considerations.
Q82
Which service helps to monitor file integrity in VMware Carbon Black?
AFile Integrity Monitoring (FIM)
BEvent Process Analysis
CCloud Security Posture Management
DEndpoint Detection and Response
Explanation
File Integrity Monitoring (FIM) specifically checks for unauthorized changes, while others serve different purposes.
Q83
A company needs to enforce application control but also allow updates. What should they configure?
AAllow mode with scripts
BCustom policy with whitelist
CBlock mode by default
DAudit mode only
Explanation
Custom policy with whitelist allows updates while enforcing control, while others either block or do not enforce properly.
Q84
You are configuring a deployment with multiple hosts. What is critical to consider?
AOnly the OS version on each host
BNetwork bandwidth between hosts
CConsistency of policy across hosts
DGeographical location of users
Explanation
Consistency of policy across hosts ensures efficient and predictable behavior, while others are less critical for VMware Carbon Black.
Q85
Which of the following functions identifies and blocks unapproved applications?
AApplication Control
BVMware Horizon
CNSX Distributed Firewall
DvSphere HA
Explanation
Application Control is specifically designed to manage approved application lists, while the others focus on virtualization and networking.
Q86
A company needs to enforce compliance with application usage. Which Carbon Black feature would best accomplish this?
APolicy Management
BNetwork Segmentation
CSecurity Logs
DUser Behavior Analytics
Explanation
Policy Management allows enforcement of application use policies, while the other options provide different security functionalities.
Q87
You are configuring the Application Control layout. What happens when duplicate policies are encountered in the configuration?
AThey cancel each other out.
BThe last one saved takes precedence.
CAn error is generated.
DAll policies are ignored.
Explanation
The last saved policy will take precedence over previously defined ones, while the other options misrepresent the actual behavior.
Q88
Which service is used to manage application control policies in VMware Carbon Black?
ACarbon Black Application Control Server
BCarbon Black Response
CVMware vCenter
DCarbon Black Threat Analysis
Explanation
The Application Control Server manages policies, unlike the other services that serve different purposes.
Q89
A company needs to ensure that certain applications cannot be overwritten or replaced. Which feature in Carbon Black should they use?
AApplication Locking
BBlacklist Policy
CWhitelisting
DBehavioral Monitoring
Explanation
Application locking prevents changes, which blacklists and whitelists do not specifically do.
Q90
You are configuring file integrity monitoring in Carbon Black. What happens when a monitored file is modified?
ANo action is taken
BAn alert is generated
CThe file is quarantined
DIt automatically rolls back
Explanation
File modifications trigger alerts, while antibacterial actions are not automatic or related to monitoring.