VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 101–110 of 200

Q101

You are configuring a policy in Carbon Black for a financial institution. What is crucial to include for compliance?

  • A Behavioral scan settings
  • B Malware hash lists
  • C Privileged user monitoring
  • D Network usage logs
Explanation Privileged user monitoring is essential for compliance in financial institutions, while the others are important but not compliance-centric.
Q102

What happens when you disable a rule in a Carbon Black policy?

  • A The rule becomes inactive
  • B All endpoints ignore the policy
  • C Only new endpoints are affected
  • D All historical data is deleted
Explanation Disabling a rule makes it inactive while retaining the policy and historical data intact.
Q103

Which service allows for endpoint visibility in VMware Carbon Black Cloud?

  • A Endpoint Standard
  • B Workspace ONE
  • C vSphere Security
  • D Cloud Disaster Recovery
Explanation Endpoint Standard provides comprehensive endpoint visibility, unlike the other services listed.
Q104

A company needs to monitor suspicious file activities. Which feature should they enable?

  • A File Integrity Monitoring
  • B Script Control
  • C Application Control
  • D Threat Intelligence
Explanation File Integrity Monitoring tracks file changes that indicate suspicious activities.
Q105

You are configuring a response action in Carbon Black Cloud. What happens if you choose 'Quarantine'?

  • A File is deleted immediately
  • B File moves to a secured area
  • C System shuts down automatically
  • D File is archived for future use
Explanation Quarantine moves the file to a secured area for further analysis, while other options do not reflect the correct behavior.
Q106

Which service in VMware Carbon Black Cloud facilitates endpoint detection and response?

  • A Endpoint Standard
  • B Threat Remediation
  • C Cloud Security Posture
  • D Network Firewall
Explanation Endpoint Standard provides the core EDR capabilities, while the others serve different functions.
Q107

A company needs to ensure that their Carbon Black Cloud deployment monitors only critical devices. What should they configure?

  • A Exclude non-critical hosts from policies
  • B Apply threat intelligence integrations
  • C Develop custom application lists
  • D Set retention policy to 1 month
Explanation Excluding non-critical hosts from policies ensures only essential devices are monitored.
Q108

What happens when a device becomes non-compliant with a policy in Carbon Black Cloud?

  • A It is automatically quarantined
  • B Alerts are generated for IT teams
  • C All policies apply immediately
  • D No further actions are taken
Explanation Alerts are generated to inform teams, while others are not correct responses based on compliance actions.
Q109

Which service in VMware Carbon Black Cloud detects active threats?

  • A Threat Analysis
  • B Continuous Monitoring
  • C Resource Allocation
  • D Endpoint Detection
Explanation Endpoint Detection identifies and responds to current threats, while others do not focus on active threat detection.
Q110

A company needs to ensure that sensitive data is encrypted during transmission. What configuration should they use in VMware Carbon Black Cloud?

  • A Data Retention Policy
  • B Encryption at Rest
  • C Endpoint Configuration
  • D Transport Layer Security
Explanation Transport Layer Security is the correct option for encrypting data in transit, while the others do not serve this purpose directly.