VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 200

Q131

A company needs to secure its cloud applications. Which VMware Carbon Black feature should they implement?

  • A Advanced Malware Protection
  • B Cloud Workload Protection
  • C Log Analysis
  • D Compliance Monitoring
Explanation Cloud Workload Protection is designed for securing cloud applications, unlike the other options.
Q132

What happens when a device is quarantined in VMware Carbon Black?

  • A It cannot connect to the network
  • B User cannot access any files
  • C All applications are immediately stopped
  • D It continues as normal
Explanation Quarantining a device blocks it from network connections, while the other options are incorrect scenarios.
Q133

Which service does VMware Carbon Black Cloud use for threat intelligence?

  • A Threat Data Feed
  • B Cloud Sandbox
  • C Incident Response
  • D Firewall Management
Explanation Threat Data Feed provides continuous threat intelligence; other options are related but not focused on threat intelligence.
Q134

A company needs to restrict administrator access on the Carbon Black Cloud. What feature should they implement?

  • A User Access Control
  • B Network Security Policies
  • C Sandbox Configuration
  • D Incident Workflow Automation
Explanation User Access Control grants tailored permissions; the other options don't specifically restrict access.
Q135

What happens when an endpoint is set in 'lock' mode on Carbon Black Cloud?

  • A No new software can install.
  • B All communications are blocked.
  • C User cannot shut down device.
  • D Malware can still be executed.
Explanation Lock mode prevents new installations; other options misrepresent the effects of lock mode.
Q136

Which service in VMware Carbon Black Cloud focuses on endpoint detection and response?

  • A EDR Service
  • B Threat Intelligence
  • C Compliance Management
  • D Network Security
Explanation EDR Service is specifically designed for endpoint detection and response, while the others focus on different functionalities.
Q137

A company needs to protect user devices from phishing attacks. What should they primarily configure in VMware Carbon Black Cloud?

  • A Threat Intelligence Module
  • B Security Policies
  • C Virus Scan Options
  • D User Activity Logs
Explanation Configuring security policies directly guards against phishing; the other options do not primarily address this threat.
Q138

You are configuring user roles in VMware Carbon Black Cloud. What happens when a user has 'Viewer' access?

  • A Can modify settings
  • B Can view reports only
  • C Can manage endpoints
  • D Can execute all tasks
Explanation Viewer access restricts users to viewing reports only, while the other options permit actions beyond viewing.
Q139

Which service in VMware Carbon Black Cloud helps manage vulnerabilities?

  • A Vulnerability Management
  • B Threat Intelligence
  • C Endpoint Detection
  • D Incident Response
Explanation Vulnerability Management specifically addresses vulnerabilities across systems, while others focus on threat detection and response.
Q140

A company needs to isolate a compromised endpoint. What is the first action to perform?

  • A Uninstall the agent
  • B Initiate containment
  • C Run a vulnerability scan
  • D Update the firewall rules
Explanation Initiating containment prevents further damage and protects the network, while the others do not ensure immediate isolation.