VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 191–200 of 200

Q191

A company needs to ensure compliance with security policies across various remote endpoints. What feature should they enable?

  • A Whitelist Management
  • B Configuration Auditing
  • C Incident Response Plan
  • D User Activity Monitoring
Explanation Configuration Auditing verifies endpoint compliance; others don't directly enforce policies.
Q192

You are configuring a policy with alerts for suspicious file activities. What should you set to ensure efficiency?

  • A Alert on all file changes
  • B Use threshold limits for alerts
  • C Disable all non-critical reporting
  • D Activate historical data tracking
Explanation Threshold limits prevent alert fatigue from benign changes; others can generate excessive alerts.
Q193

Which service in VMware Carbon Black Cloud identifies and responds to threats?

  • A Threat Detection
  • B Data Backup
  • C Network Monitoring
  • D User Management
Explanation Threat Detection actively identifies and responds to threats, while other options do not serve this purpose.
Q194

A company needs to enhance its endpoint security posture. Which VMware Carbon Black feature should they implement?

  • A Endpoint Detection and Response
  • B Static Analysis
  • C Server Image Management
  • D User Access Control
Explanation Endpoint Detection and Response enhances endpoint security, unlike the other features listed.
Q195

You are configuring application control policies in VMware Carbon Black Cloud. What happens when an application is blocked?

  • A It is removed from the system
  • B It reports an error to the user
  • C It is monitored but not executed
  • D It is uninstalled automatically
Explanation Blocked applications remain on the system but are not allowed to execute; other options suggest incorrect actions on the application.
Q196

Which service in VMware Carbon Black Cloud is responsible for threat remediation?

  • A Response
  • B Detection
  • C Prevention
  • D Monitoring
Explanation Response service automates remediation steps, unlike others.
Q197

A company needs to analyze attack vectors. Which module should they focus on?

  • A Threat Intelligence
  • B Active Response
  • C Endpoint Detection
  • D Configuration Monitoring
Explanation Threat Intelligence provides insights on attack vectors.
Q198

You are configuring alerts in Carbon Black. What happens when sensitivity is set to 'high'?

  • A Fewer alerts are generated.
  • B More irrelevant alerts occur.
  • C More relevant alerts are triggered.
  • D No alerts will be generated.
Explanation High sensitivity increases relevant alert generation.
Q199

Which service in VMware Carbon Black Cloud helps with endpoint detection and response?

  • A Threat Hunting
  • B Network Monitoring
  • C Cloud Storage
  • D Data Backup
Explanation Threat Hunting enhances endpoint detection and response capabilities while the others do not focus on endpoint security.
Q200

You are configuring policies in VMware Carbon Black Cloud. What happens when a policy is applied to a device group?

  • A Devices get uninstalled
  • B Devices receive security settings
  • C Policies reset automatically
  • D No changes occur
Explanation Applying a policy distributes configured security settings to all devices in the group; the other options do not align with policy application behavior.