You are configuring policies in VMware Carbon Black. Which action can you specify to improve endpoint security?
AUser Behavior Analysis
BData Encryption Settings
CFile Integrity Monitoring
DMalware Scanning Frequency
Explanation
File Integrity Monitoring specifically detects unauthorized changes, while the others are relevant but do not focus on this aspect.
Q142
Which service is most commonly used for threat intelligence in VMware Carbon Black?
AThreat Insights
BCloud Security
CEvent Management
DEndpoint Protection
Explanation
Threat Insights aggregates and analyzes threat data, while the others do not specialize in threat intelligence.
Q143
A company needs to set a compliance policy for their endpoints using VMware Carbon Black. What should they configure to ensure only approved applications run?
AApplication Blacklisting
BIntegrity Monitoring
CApplication Whitelisting
DFile Integrity Checking
Explanation
Application Whitelisting allows only approved applications, unlike the others which do not specifically enforce approval.
Q144
What happens when an endpoint's security agent is disconnected from the VMware Carbon Black server for 30 days?
AIt continues sending logs normally.
BIt stops responding to commands instantly.
CIt operates in a limited mode.
DIt becomes inactive until reconnected.
Explanation
The agent operates in a limited mode, allowing for temporary local responses, unlike complete disconnection or inactivity.
Q145
Which service in VMware Carbon Black provides real-time threat detection?
AEvent Streaming
BThreat Intelligence
CSensor Management
DIncident Response
Explanation
Threat Intelligence analyzes and correlates threats in real time; others focus on different areas.
Q146
A company needs to secure its endpoints against ransomware. Which feature of VMware Carbon Black is most effective for this?
ABehavioral Detonation
BCloud Threat Detection
CFile Integrity Monitoring
DMalware Remediation
Explanation
Behavioral Detonation allows for dynamic analysis of potential ransomware, while others provide unrelated capabilities.
Q147
You are configuring alerts in Carbon Black. What happens when the alert threshold is set too low?
ANo alerts will trigger.
BThere will be fewer alerts.
CToo many alerts may overwhelm users.
DOnly critical alerts will trigger.
Explanation
Setting the threshold too low generates excessive alerts, complicating response efforts; the other options misinterpret alert functionality.
Q148
Which service in VMware Carbon Black is responsible for classifying files based on threat intelligence?
AFile Reputation Service
BBehavioral Analysis Engine
CIncident Response Manager
DAlert Prioritization Tool
Explanation
The File Reputation Service classifies files as known good or known bad using threat intelligence, while the other options provide different functionalities.
Q149
A company needs to ensure their endpoint security is compliant with GDPR regulations. What feature should they prioritize in VMware Carbon Black?
AReal-Time Response
BAutomated Remediation
CData Privacy Configurations
DVulnerability Scanning
Explanation
Data Privacy Configurations focus on compliance with regulations like GDPR, while the other options are important but not specifically related to data privacy.
Q150
You are configuring a detection rule in Carbon Black to monitor unusual behavior. What action should you take to reduce false positives?
AIncrease the alert severity
BAdd reputation-based whitelisting
CEnable all notifications
DLower the detection threshold
Explanation
Adding reputation-based whitelisting limits alerts to known safe files and actions, whereas the other actions could increase false positives.