VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 31–40 of 200

Q31

Which feature of VMware Carbon Black Cloud allows for extensive user behavior analysis?

  • A User Activity Monitoring
  • B File Integrity Monitoring
  • C Vulnerability Assessment
  • D Policy Enforcement
Explanation User Activity Monitoring tracks and analyzes user actions, while the others focus on other aspects like file integrity or vulnerability.
Q32

A company needs to ensure its endpoints are protected from malware without significant performance impact. Which VMware Carbon Black Cloud feature should they employ?

  • A Malware Prevention
  • B Behavioral Based Protection
  • C Web Filtering
  • D Threat Intelligence
Explanation Behavioral Based Protection identifies and blocks malware based on behavior, minimizing performance issues unlike traditional signature-based methods.
Q33

What happens when Carbon Black Cloud detects suspicious activity on an endpoint?

  • A It ignores the behavior
  • B It logs the activity
  • C It quarantine the entire system
  • D It shuts down the endpoint
Explanation Carbon Black Cloud logs the activity for analysis, while the others are either ineffective or overly aggressive responses.
Q34

Which service allows integration with third-party applications?

  • A Carbon Black Cloud API
  • B VMware vCenter Server
  • C Carbon Black Response
  • D VMware NSX-T
Explanation The Carbon Black Cloud API enables third-party integrations, whereas others serve different primary functions.
Q35

A company needs to identify advanced threats that bypass traditional security. What should they implement?

  • A Endpoint Protection only
  • B Threat Hunting features
  • C Simple Antivirus
  • D Firewall rules
Explanation Threat Hunting features specifically target advanced threats, unlike basic security methods.
Q36

You are configuring policies in Carbon Black, which setting is critical for detecting ransomware activity?

  • A Data retention policies
  • B File and process monitoring
  • C Network band monitoring
  • D User access controls
Explanation File and process monitoring is essential for detecting ransomware actions, while the others are less relevant.
Q37

Which service provides endpoint detection and response in VMware Carbon Black Cloud?

  • A Endpoint Detection and Response (EDR)
  • B Insider Threat Detection
  • C Threat Intelligence Service
  • D Cloud Security Posture Management
Explanation EDR is specifically designed for endpoint detection while the others focus on different areas.
Q38

A company needs to maximize their security posture with minimal operational impact. Which feature should they leverage for automated response?

  • A Managed Detection and Response (MDR)
  • B Automated Policy Enforcement
  • C Threat Intelligence Integration
  • D Behavioral Indicators of Compromise
Explanation Automated Policy Enforcement offers immediate, automated responses to threats without manual intervention.
Q39

You are configuring a Carbon Black Cloud policy. What happens when the 'Block' action is selected for a specific file type?

  • A The file is quarantined immediately.
  • B The file is logged for future review.
  • C User receives a notification only.
  • D The file is prevented from executing.
Explanation Selecting 'Block' prevents the file from executing, while the other options do not fully reflect the action taken.
Q40

Which service does VMware Carbon Black Cloud use for behavioral analysis?

  • A Advanced Threat Detection
  • B Network Security Monitoring
  • C Process Automation
  • D Data Loss Prevention
Explanation Advanced Threat Detection analyzes behaviors, not the others.