Which service is specifically designed for threat intelligence in VMware Carbon Black Cloud?
AThreat Analysis Service
BThreat Intelligence Service
CIncident Response Service
DEndpoint Protection Service
Explanation
The Threat Intelligence Service provides actionable insights into threat data, while others focus on response or general protection.
Q182
A company needs to quickly isolate a compromised endpoint. Which action should they take in VMware Carbon Black Cloud?
ARemediate the devices immediately
BQuarantine the endpoint
CDisable all network access
DDelete the endpoint from inventory
Explanation
Quarantining allows for isolation without data loss; the other options may disrupt operations or lead to data loss.
Q183
What happens when a VMware Carbon Black Cloud sensor is unresponsive for an extended period?
AAll endpoints are automatically quarantined
BData collection stops for that endpoint
CAlerts are disabled globally
DMalicious activity goes unmonitored
Explanation
When a sensor is unresponsive, it stops collecting data specifically for that endpoint, affecting visibility.
Q184
Which service does VMware Carbon Black Cloud primarily use for threat detection?
ABehavioral analysis engine
BFirewall management system
CBackup and recovery solution
DVirtualization services
Explanation
The behavioral analysis engine is essential for detecting threats through monitoring activities, while the other options do not focus on threat detection.
Q185
A company needs to limit the risk of malware spreading from removable devices. What should they configure in Carbon Black Cloud?
AVulnerability scans on devices
BApplication control policies
CAccess control lists
DRemovable media policy
Explanation
Configuring a removable media policy specifically addresses the threat from removable devices, whereas the other options focus on different security aspects.
Q186
What happens when a user's device sends a suspicious file to the Carbon Black Cloud for analysis?
AImmediate quarantine of the device
BFile reviewed for behavioral indicators
CThe device is shut down remotely
DUser receives an alert only
Explanation
The suspicious file undergoes behavioral analysis, while immediate quarantine and remote shutdown are not standard responses.
Q187
Which service allows for visibility into endpoint activity within VMware Carbon Black Cloud?
AEndpoint Detection and Response
BNetwork Security
CCloud Health Monitoring
DPatch Management
Explanation
Endpoint Detection and Response provides detailed endpoint visibility; others focus on different aspects of security.
Q188
A company needs to prioritize resources for incident response. Which feature assists in determining alert severity?
AThreat Intelligence
BLive Response
CRisk Score
DTask Automation
Explanation
The Risk Score helps assess alert severity, while others serve different purposes.
Q189
You are configuring policy settings to restrict unauthorized applications. What happens if a user attempts to launch a blocked application?
AThe application runs silently
BUser receives a warning
CApplication is denied access
DNothing happens at all
Explanation
The application is denied access; the other options do not align with Carbon Black's blocking behavior.
Q190
Which service in VMware Carbon Black Cloud is primarily responsible for endpoint detection and response (EDR)?
ACB Defense
BCloud Onboarding
CThreat Intelligence
DCentrally Managed Logging
Explanation
CB Defense provides EDR capabilities; other options support different functions.