VMware
Carbon Black Cloud Technical Specialist
250-602
Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.
200 questions
0 views
Free
Questions 131–140 of 200
A company needs to secure its cloud applications. Which VMware Carbon Black feature should they implement?
-
A
Advanced Malware Protection
-
B
Cloud Workload Protection
-
C
Log Analysis
-
D
Compliance Monitoring
Explanation
Cloud Workload Protection is designed for securing cloud applications, unlike the other options.
What happens when a device is quarantined in VMware Carbon Black?
-
A
It cannot connect to the network
-
B
User cannot access any files
-
C
All applications are immediately stopped
-
D
It continues as normal
Explanation
Quarantining a device blocks it from network connections, while the other options are incorrect scenarios.
Which service does VMware Carbon Black Cloud use for threat intelligence?
-
A
Threat Data Feed
-
B
Cloud Sandbox
-
C
Incident Response
-
D
Firewall Management
Explanation
Threat Data Feed provides continuous threat intelligence; other options are related but not focused on threat intelligence.
A company needs to restrict administrator access on the Carbon Black Cloud. What feature should they implement?
-
A
User Access Control
-
B
Network Security Policies
-
C
Sandbox Configuration
-
D
Incident Workflow Automation
Explanation
User Access Control grants tailored permissions; the other options don't specifically restrict access.
What happens when an endpoint is set in 'lock' mode on Carbon Black Cloud?
-
A
No new software can install.
-
B
All communications are blocked.
-
C
User cannot shut down device.
-
D
Malware can still be executed.
Explanation
Lock mode prevents new installations; other options misrepresent the effects of lock mode.
Which service in VMware Carbon Black Cloud focuses on endpoint detection and response?
-
A
EDR Service
-
B
Threat Intelligence
-
C
Compliance Management
-
D
Network Security
Explanation
EDR Service is specifically designed for endpoint detection and response, while the others focus on different functionalities.
A company needs to protect user devices from phishing attacks. What should they primarily configure in VMware Carbon Black Cloud?
-
A
Threat Intelligence Module
-
B
Security Policies
-
C
Virus Scan Options
-
D
User Activity Logs
Explanation
Configuring security policies directly guards against phishing; the other options do not primarily address this threat.
You are configuring user roles in VMware Carbon Black Cloud. What happens when a user has 'Viewer' access?
-
A
Can modify settings
-
B
Can view reports only
-
C
Can manage endpoints
-
D
Can execute all tasks
Explanation
Viewer access restricts users to viewing reports only, while the other options permit actions beyond viewing.
Which service in VMware Carbon Black Cloud helps manage vulnerabilities?
-
A
Vulnerability Management
-
B
Threat Intelligence
-
C
Endpoint Detection
-
D
Incident Response
Explanation
Vulnerability Management specifically addresses vulnerabilities across systems, while others focus on threat detection and response.
A company needs to isolate a compromised endpoint. What is the first action to perform?
-
A
Uninstall the agent
-
B
Initiate containment
-
C
Run a vulnerability scan
-
D
Update the firewall rules
Explanation
Initiating containment prevents further damage and protects the network, while the others do not ensure immediate isolation.