VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 11–20 of 200

Q11

A company needs to secure its remote devices. Which feature should they utilize?

  • A Cloud Workload Protection
  • B Auto-Containment
  • C Cloud Security Posture Management
  • D Remote Device Management
Explanation Remote Device Management provides specific features and policies to secure remote devices, unlike the other options which address broader security aspects.
Q12

What happens when you enable Live Response on an infected endpoint?

  • A Immediate malware deletion
  • B Remote access to the endpoint
  • C Endpoint isolation from network
  • D Real-time logging of user activity
Explanation Live Response allows security teams to gain remote access to an infected endpoint to investigate, while the other options are not functionalities of Live Response.
Q13

Which service is primarily used for endpoint detection in VMware Carbon Black Cloud?

  • A Endpoint Standard
  • B Cloud Workload Protection
  • C VMware Identity Manager
  • D vSphere Security
Explanation Endpoint Standard is specifically designed for endpoint detection and response, while the others serve different functions.
Q14

A company needs to protect its virtual machines in the cloud. Which feature of VMware Carbon Black should they enable?

  • A Application Control
  • B Cloud Workload Protection
  • C Threat Intelligence
  • D Policy Management
Explanation Cloud Workload Protection secures virtual machines, unlike the others that focus on different security aspects.
Q15

What happens when VMware Carbon Black detects a suspicious file on an endpoint?

  • A The file is automatically deleted
  • B User notified for manual action
  • C File is quarantined
  • D Scan is immediately terminated
Explanation Suspicious files are quarantined to prevent potential harm; they are not deleted or result in scan termination.
Q16

Which service within VMware Carbon Black Cloud provides threat intelligence feeds?

  • A Threat Intelligence Service
  • B Endpoint Protection Service
  • C Incident Response Service
  • D Central Management Service
Explanation The Threat Intelligence Service provides comprehensive threat intelligence feeds; other options are focused on different functionalities.
Q17

A company needs to mitigate risk from malicious scripts in PowerShell. What feature can they implement in VMware Carbon Black Cloud?

  • A Script Control
  • B File Integrity Monitoring
  • C User Behavior Analytics
  • D Exploit Prevention
Explanation Script Control specifically addresses potential threats from scripts; other options target different threats.
Q18

What happens when policy enforcement is configured in VMware Carbon Black Cloud?

  • A Automatic malware removal occurs
  • B Predefined actions are enforced
  • C Logs are sent to third-party services
  • D Agents become inactive
Explanation Policy enforcement ensures predefined actions are applied to events; other options are not direct results of policy enforcement.
Q19

Which service in VMware Carbon Black Cloud provides real-time threat detection?

  • A Endpoint Detection and Response (EDR)
  • B Log Analysis Service
  • C Threat Intelligence Feed
  • D Cloud Storage Service
Explanation EDR provides real-time monitoring of threats, while others serve different functions.
Q20

A company needs to improve its incident response time. What feature should it enable in VMware Carbon Black Cloud?

  • A Automated Response Actions
  • B Network Traffic Monitoring
  • C User Behavior Analytics
  • D Vulnerability Scanning
Explanation Automated Response Actions streamline and speed up incident response, unlike the other options.