VMware
Carbon Black Cloud Technical Specialist
250-602
Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.
200 questions
0 views
Free
Questions 21–30 of 200
You are configuring application control in VMware Carbon Black Cloud. What happens if a non-approved application tries to execute?
-
A
It will run without restrictions
-
B
It will be blocked immediately
-
C
It will create an alert only
-
D
It will attempt to self-approve
Explanation
Non-approved applications are blocked immediately, while others incorrectly suggest alternative behaviors.
Which service in VMware Carbon Black Cloud enables advanced threat hunting?
-
A
ThreatSearch
-
B
Event Forwarder
-
C
Sensor Management
-
D
Policy Configuration
Explanation
ThreatSearch allows for in-depth threat hunting across endpoints, while the others are management or configuration tools.
A company needs to implement application security. What feature should they use within VMware Carbon Black Cloud?
-
A
Attack Surface Management
-
B
Application Control
-
C
Log Monitoring
-
D
Network Traffic Analysis
Explanation
Application Control specifically manages and monitors application usage, unlike the others.
What happens when a Carbon Black Cloud sensor is uninstalled from a device?
-
A
All data is permanently erased
-
B
Data remains available in the cloud
-
C
Real-time monitoring continues
-
D
Malware detection is enhanced
Explanation
Uninstallation removes the local sensor but retains historical data in the cloud, while the other options are incorrect.
Which service provides real-time threat intelligence for Carbon Black Cloud?
-
A
Threat Intelligence Service
-
B
User Behavior Analytics
-
C
Managed Detection and Response
-
D
Endpoint Detection and Response
Explanation
The Threat Intelligence Service gives real-time threat data, while others serve different functions.
A company needs to configure its callback settings for Carbon Black. What should the callback URL format look like?
-
A
http://mycompany.com/callback
-
B
https://secure.mycompany.com/callback
-
C
ftp://mycompany.com/callback
-
D
http://127.0.0.1/callback
Explanation
The correct format must be HTTPS for security reasons.
What happens when you disable the scanning feature in Carbon Black Cloud while in compliance mode?
-
A
Compliance checks will still occur
-
B
All endpoint protection stops
-
C
Endpoints transition to blocked mode
-
D
No compliance status is reported
Explanation
Disabling scanning closes harmful proactivity but allows compliance reporting to continue.
Which service in VMware Carbon Black Cloud helps analyze suspicious files?
-
A
File Integrity Monitoring
-
B
Malware Detection
-
C
Threat Intelligence
-
D
Automated Response
Explanation
Malware Detection analyzes files for suspicious behavior; others focus on different security aspects.
A company needs to deploy Carbon Black Cloud's EDR capabilities. Which configuration is required?
-
A
Install additional on-premises servers
-
B
Enable EDR in the policy settings
-
C
Purchase a different product license
-
D
Use only agentless monitoring
Explanation
Enabling EDR in the policy settings activates its capabilities, while others do not meet EDR deployment criteria.
You are configuring alerts in VMware Carbon Black Cloud. What happens when you set the alert severity to 'critical'?
-
A
It triggers an immediate response
-
B
It disables all other alerts
-
C
It sends reports weekly
-
D
It raises the issue in priority
Explanation
Setting 'critical' increases the priority of alerts; others suggest non-relevant actions.