Which service of VMware Carbon Black Cloud helps in detecting endpoint threats in real-time?
AEndpoint Detection and Response
BNetwork Traffic Analysis
CThreat Intelligence Feed
DData Loss Prevention
Explanation
Endpoint Detection and Response provides real-time threat detection and response services, while the others focus on different security aspects.
Q44
A company needs to ensure secure potential threat remediation. Which feature should they prioritize in VMware Carbon Black Cloud?
ARemote shell access
BAutomated response playbooks
CReal-time traffic monitoring
DUser behavior analytics
Explanation
Automated response playbooks streamline threat remediation efforts, unlike the other options which serve different purposes.
Q45
What happens when an alert is raised in VMware Carbon Black Cloud and no action is taken?
AAlert is automatically resolved
BThreat persists potentially unattended
CUser is notified immediately
DIncidents are removed from the dashboard
Explanation
If no action is taken, the threat persists and may escalate, while the other options incorrectly imply resolution or response.
Q46
Which service in VMware Carbon Black Cloud offers real-time visibility into endpoint activity?
AThreat Hunting
BDevice Control
CFile Integrity Monitoring
DEDR
Explanation
EDR provides real-time monitoring; others focus on specific controls.
Q47
A company needs to enforce application allowlisting on its endpoints. Which feature should they implement?
ASensor Management
BApplication Control
CThreat Detection
DIncident Response
Explanation
Application Control ensures only approved applications run; other options don’t enforce allowlisting.
Q48
What happens when a detected threat is resolved in Carbon Black Cloud?
AAgent deletes the threat immediately
BThreat generates a report
CThreat is quarantined automatically
DThreat remains active until reboot
Explanation
Resolved threats are typically quarantined, not deleted or left active.
Q49
Which service in VMware Carbon Black Cloud helps monitor system behaviors in real-time?
ABehavior Monitoring
BThreat Hunting
CEndpoint Detection
DVulnerability Assessment
Explanation
Behavior Monitoring tracks real-time system behaviors, identifying malicious activities.
Q50
A company needs to ensure its endpoints block unrecognized applications. Which Carbon Black feature should they enable?
AWatchlist
BApplication Control
CFirewall Rules
DThreat Reports
Explanation
Application Control ensures only approved applications run on the endpoints.