VMware

Carbon Black Cloud Technical Specialist

250-602

Get certified with the 250-602 exam focusing on Carbon Black Cloud solutions.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 71–80 of 200

Q71

A company needs to enforce a policy against executing untrusted scripts. Which feature should they enable?

  • A Pre-Execution Policy
  • B Network Isolation
  • C Threat Intelligence Feed
  • D Application Control
Explanation Pre-Execution Policy prevents untrusted scripts from running, while the others do not directly enforce script execution policies.
Q72

What happens when the Carbon Black Cloud agent fails to communicate with the management server?

  • A Endpoint goes into quarantine mode
  • B Analysis of behavior stops
  • C All policies are removed
  • D Data loss occurs immediately
Explanation When communication fails, behavior analysis stops, but endpoints typically remain operational and retain policies enforced previously.
Q73

Which service provides threat detection and response in VMware Carbon Black Cloud?

  • A Advanced Threat Detection
  • B Vulnerability Management
  • C Network Performance Monitoring
  • D Backup and Restore Services
Explanation Advanced Threat Detection identifies and responds to threats, while the others focus on different areas.
Q74

A company needs to enforce application control policies on endpoints. What should they implement?

  • A VMware Carbon Black App Control
  • B VMware ESXi Hypervisor
  • C VMware Workspace ONE
  • D VMware vSAN
Explanation VMware Carbon Black App Control is specifically designed for application control.
Q75

What happens when a sensor reports high CPU usage for the Carbon Black agent?

  • A Agent automatically restarts
  • B No impact on functions
  • C Alerts are generated for analysis
  • D Data collection pauses temporarily
Explanation High CPU usage triggers alerts, while others do not accurately reflect the system response.
Q76

Which service in VMware Carbon Black Cloud helps identify suspicious user behavior?

  • A User Behavior Analytics
  • B Threat Intelligence
  • C Endpoint Detection
  • D Vulnerability Management
Explanation User Behavior Analytics monitors and analyzes user actions to detect anomalies, while the others focus on different aspects of security.
Q77

A company needs to improve response times for incidents detected by Carbon Black. What should they enable?

  • A Automatic Remediation
  • B Manual Review Process
  • C Threat Feed Integration
  • D Visibility Reporting
Explanation Automatic Remediation allows for real-time responses to threats, unlike the other options which do not directly enhance response speed.
Q78

You are configuring a prevention policy in VMware Carbon Black Cloud. What happens if a binary is marked 'Malicious'?

  • A Execution is allowed with warnings
  • B Further analysis is triggered only
  • C Execution is blocked immediately
  • D Malware is quarantined only
Explanation Marking a binary as 'Malicious' results in immediate execution blocking to protect the system, while the other options do not reflect the strict handling of malicious binaries.
Q79

Which service allows real-time endpoint visibility in Carbon Black Cloud?

  • A Endpoint Detection and Response
  • B Cloud Security Posture Management
  • C Network Traffic Analysis
  • D Web Application Firewall
Explanation Endpoint Detection and Response provides the needed visibility, while others focus on different security areas.
Q80

A company needs to safeguard sensitive data on its endpoints. Which feature should they implement in Carbon Black Cloud?

  • A Policy-based prevention
  • B Real-time threat intelligence
  • C User behavior analytics
  • D Hardware inventory management
Explanation Policy-based prevention directly addresses data protection, unlike the other features.