Which Carbon Black service primarily focuses on forensic investigation?
ACB Response
BCB Protect
CCB Cloud
DCB ThreatHunter
Explanation
CB Response is designed for detailed forensic analysis, while others focus on prevention or threat hunting.
Q122
A company needs to isolate a compromised endpoint from the network. What should they do?
AQuarantine the endpoint
BRemove the endpoint from the network
CDeploy a VM snapshot
DReinstall the operating system
Explanation
Quarantining prevents further communication without losing data, unlike the other options.
Q123
What happens when you disable Carbon Black's threat detection policies?
ANo threats will be detected
BAll logs will be deleted
CEndpoints cannot be managed
DPerformance improves immediately
Explanation
Disabling detection policies stops threat identification, while other options are inaccurate interpretations.
Q124
Which service in VMware Carbon Black provides threat intelligence for behaviors?
ABehavioral EDR
BCloud Authentication
CNetwork Forensics
DEnterprise Management
Explanation
Behavioral EDR focuses on monitoring and analyzing threat behaviors, while the others serve different purposes.
Q125
A company needs to analyze incident data from the previous quarter. What feature should they use in VMware Carbon Black?
AThreat Extraction
BSearch Functionality
CIncident Response Plan
DDevice Inventory
Explanation
The search functionality enables analyzing incident data effectively over specified periods, unlike the other options.
Q126
You are configuring the alert threshold in VMware Carbon Black. What happens when the threshold is set too low?
AMore relevant alerts generated
BFewer false positives reported
CIncreased alert fatigue for staff
DDecreased security awareness
Explanation
Setting a threshold too low creates excessive alerts leading to fatigue, while the other options reflect incorrect outcomes.
Q127
What service in VMware Carbon Black enables the collection of threat intelligence feeds?
AThreat Intelligence Service
BEvent Monitoring
CIncident Response
DData Recovery
Explanation
The Threat Intelligence Service integrates external feeds for enhanced detection, while others focus on different functionalities.
Q128
A company needs to apply a policy to all endpoints, but exclude endpoints with a specific application. Which policy setting should be used?
AExclude rule
BInclusion rule
COverride policy
DGlobal policy
Explanation
Using an Exclude rule effectively applies a policy while exempting specified endpoints, whereas other options do not meet exclusion criteria.
Q129
You are configuring alerts in VMware Carbon Black to optimize for response time. Which setting should you prioritize?
AAlert criticality levels
BEmail notification settings
CSystem performance metrics
DPolicy enforcement settings
Explanation
Prioritizing alert criticality levels ensures quick responses to significant threats, while other settings focus on different aspects.
Q130
Which service provides proactive threat hunting capabilities in Carbon Black?
ACB ThreatHunter
BCB Protection
CCB Defense
DCB Cloud
Explanation
CB ThreatHunter is designed for proactive threat hunting, while the others focus on reactive measures.