VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 121–130 of 200

Q121

Which service in VMware Carbon Black provides real-time endpoint visibility?

  • A Event Stream Processing
  • B Threat Intelligence
  • C Endpoint Detection and Response
  • D Cloud Security Posture Management
Explanation Endpoint Detection and Response offers real-time visibility, while others serve different purposes.
Q122

A company needs to apply strict policies for sensitive file access. Which feature should they use in VMware Carbon Black?

  • A Playbooks
  • B File Integrity Monitoring
  • C User Behavior Analytics
  • D Threat Remediation
Explanation File Integrity Monitoring directly addresses secure file access policies, unlike the others.
Q123

You are configuring alert thresholds in VMware Carbon Black. What happens when the threshold is exceeded?

  • A No action is taken
  • B Incident is automatically closed
  • C An alert is triggered
  • D System performance slows down
Explanation Exceeding the threshold triggers an alert, while others do not reflect expected outcomes.
Q124

Which service is primarily responsible for endpoint protection?

  • A Endpoint Detection and Response (EDR)
  • B Network Traffic Analysis (NTA)
  • C Virtualized Security Management (VSM)
  • D Cloud Access Security Broker (CASB)
Explanation EDR focuses on detecting and responding to endpoint threats; NTA and other options do not.
Q125

A company needs to secure sensitive data being transferred to the cloud. What is the best solution?

  • A End-to-end encryption on data transfers
  • B Firewalls on the company network
  • C Physical security measures at the data center
  • D Anti-virus software on all endpoints
Explanation End-to-end encryption protects the data in transit; the others do not address data transfer security.
Q126

What happens when an application whitelist policy is enforced?

  • A Only approved applications can run
  • B All applications are allowed by default
  • C User installations are permanently blocked
  • D All network traffic is filtered
Explanation An application whitelist policy restricts execution to only allowed apps, while others either incorrectly describe it or misrepresent its impact.
Q127

Which service in VMware Carbon Black Cloud detects advanced threats?

  • A Threat Intelligence
  • B File Integrity Monitoring
  • C Endpoint Detection and Response
  • D Application Control
Explanation Endpoint Detection and Response identifies advanced threats, while the other services focus on different security aspects.
Q128

A company needs to ensure compliance with PCI DSS. Which feature should they enable?

  • A File Integrity Monitoring
  • B Application Control
  • C Device Control
  • D Threat Hunting
Explanation File Integrity Monitoring helps in compliance with PCI DSS by ensuring changes to critical files are detected.
Q129

What happens when you enable Tamper Protection in Carbon Black Cloud?

  • A Users can modify settings
  • B Agents cannot be uninstalled
  • C Data collection stops
  • D Exclusions become ineffective
Explanation Tamper Protection prevents uninstallation and modification of the agents, while other options are incorrect consequences.
Q130

Which service in VMware Carbon Black Cloud helps identify unpatched vulnerabilities?

  • A Vulnerability Management
  • B Endpoint Detection and Response
  • C Threat Intelligence
  • D Incident Response
Explanation Vulnerability Management scans for unpatched vulnerabilities, while others focus on detection, intelligence, or response.