VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 61–70 of 200

Q61

Which service in VMware Carbon Black Cloud provides real-time threat detection?

  • A Threat Intelligence
  • B Incident Response
  • C Endpoint Detection and Response
  • D Compliance Monitoring
Explanation Endpoint Detection and Response actively monitors endpoints for threats, while the other options provide support functions or services.
Q62

A company needs to secure its endpoints with minimal performance impact. Which method should they choose?

  • A Cloud-based antivirus scan
  • B Full disk encryption
  • C On-premises agent-intensive scanning
  • D Lightweight cloud-based security agent
Explanation A lightweight cloud-based security agent minimizes performance impact while maintaining security, unlike the other options.
Q63

What happens when you disable a policy in VMware Carbon Black Cloud?

  • A All rules are deleted.
  • B Endpoints revert to default settings.
  • C Endpoints stop reporting data.
  • D Policies become inactive but not deleted.
Explanation Disabling a policy makes it inactive; it retains its configuration without deletion.
Q64

Which service does VMware Carbon Black Cloud use for endpoint detection?

  • A Continuous Monitoring Service
  • B Managed Detection Service
  • C Behavioral Threat Detection
  • D Vulnerability Scanning Service
Explanation Behavioral Threat Detection is key for identifying malicious activities on endpoints, while the others provide different functionalities.
Q65

A company needs to enhance its security posture by reducing threat exposure. Which feature should they implement?

  • A Automated Remediation
  • B Manual Task Assignment
  • C Threat Hunting
  • D File Integrity Monitoring
Explanation Automated Remediation directly reduces threat exposure by eliminating threats quickly, whereas the others focus on different security processes.
Q66

You are configuring a response workflow in VMware Carbon Black Cloud. What happens when a device goes offline?

  • A Detection alerts are disabled
  • B Responses will queue until it reconnects
  • C No impact on detection capabilities
  • D Alarms are sent to the cloud
Explanation Responses will queue for offline devices to ensure actions are applied once they reconnect, while the other options misrepresent the impact of going offline.
Q67

Which service in VMware Carbon Black allows threat detection based on behavioral analytics?

  • A Behavioral Antivirus
  • B Threat Intelligence
  • C Endpoint Detection and Response
  • D Vulnerability Management
Explanation Endpoint Detection and Response uses behavioral analytics to detect threats, while the others focus on different security aspects.
Q68

A company needs to enhance its endpoint security posture but wants to minimize user disruption. What should they implement?

  • A Complete system lockdown
  • B User-executed scans only
  • C Automatic threat response actions
  • D Remove user permissions
Explanation Automatic threat response actions help mitigate threats with minimal disruption, unlike the other options which are more intrusive.
Q69

You are configuring the Carbon Black Cloud's event retention settings. What happens when you set the retention period to 30 days?

  • A Events are deleted after 15 days
  • B Events are retained for 30 days
  • C Events are archived to cloud storage
  • D Events are visible indefinitely
Explanation Setting the retention period to 30 days means events are kept for that duration before deletion; the other options don't accurately reflect this functionality.
Q70

Which service does VMware Carbon Black Cloud primarily provide?

  • A Endpoint protection and threat detection
  • B Data backup and recovery
  • C Cloud storage solutions
  • D Network configuration tools
Explanation The primary service offered is endpoint protection and threat detection, while the others do not relate to Carbon Black Cloud functionality.