VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 161–170 of 200

Q161

A company needs to ensure real-time protection against malware. What should they prioritize in their VMware Carbon Black Cloud configuration?

  • A Manual scanning schedule
  • B Real-time task policies
  • C Firewall rules
  • D User activity logging
Explanation Real-time task policies actively monitor and block threats, unlike passive measures like manual scanning.
Q162

You are configuring the VMware Carbon Black Cloud to block USB devices. What will happen to a device already connected when you apply this policy?

  • A Device immediately disconnects
  • B Device becomes read-only
  • C Device is unaffected by policy
  • D Device is locked until reboot
Explanation A policy will not affect already connected devices until they are disconnected and reconnected.
Q163

Which service allows for real-time endpoint threat detection?

  • A Threat Intelligence
  • B VMware Identity Manager
  • C Carbon Black Cloud
  • D vSphere Availability
Explanation Carbon Black Cloud provides real-time threat detection, while the others serve different functions.
Q164

A company needs to ensure compliance with data privacy regulations. What should they prioritize?

  • A Disabling All Firewall Policies
  • B Regular Security Audits
  • C Limit Software Updates
  • D Using Public Wi-Fi
Explanation Regular security audits help ensure compliance, while the other options can compromise security.
Q165

You are configuring sensor settings for an endpoint. What happens if you enable 'block' mode?

  • A Prompts user for permission
  • B Silently blocks threats
  • C Logs all activities only
  • D Disables all monitoring
Explanation In 'block' mode, threats are silently blocked without user prompts, unlike the other options that misrepresent its function.
Q166

Which service does VMware Carbon Black Cloud use for threat intelligence?

  • A Cloud Threat Intelligence
  • B Local Threat Analysis
  • C Community Surveillance Network
  • D Private Data Repository
Explanation Cloud Threat Intelligence aggregates data across environments, while others do not.
Q167

A company needs to secure its endpoints but wants to minimize the administrative overhead. Which VMware Carbon Black Cloud feature should they prioritize?

  • A Automated Incident Response
  • B Manual Policy Enforcement
  • C Static Analysis Scanning
  • D Full Disk Encryption
Explanation Automated Incident Response reduces workload significantly compared to manual options.
Q168

What happens when an endpoint is quarantined in VMware Carbon Black Cloud?

  • A Isolated from network communication
  • B Automatically reboots immediately
  • C All files are deleted
  • D User access is terminated
Explanation Quarantining isolates the endpoint but does not delete files or terminate access.
Q169

Which service in VMware Carbon Black Cloud enables threat hunting?

  • A Threat Analysis
  • B Endpoint Detection
  • C Real Time Response
  • D Advanced Search
Explanation Advanced Search allows security teams to hunt threats quickly while other options focus on different functions.
Q170

A company needs to ensure automated remediation after detection of malware. Which feature should they enable?

  • A Auto-Containment
  • B Manual Response
  • C Notification Alerts
  • D Threat Intelligence
Explanation Auto-Containment provides automated response functionalities, while the others do not execute automatic remediation.