Which service is primarily responsible for real-time threat monitoring in VMware Carbon Black EDR?
AThreat Analysis Service
BEndpoint Detection Service
CResponse Management Service
DIncident Response Service
Explanation
The Threat Analysis Service provides real-time monitoring, while others focus on response or management.
Q152
A company needs to implement automated containment for a potential malware infection. Which feature in Carbon Black should they use?
ABlocklisting
BSensor Rules
CThreat Intelligence
DLive Response
Explanation
Live Response allows immediate containment actions on endpoints, unlike other features.
Q153
You are configuring alerts in Carbon Black. What happens when you set a severity level to 'Critical'?
ANo alerts will trigger.
BOnly low-severity alerts are shown.
CHigh-priority alerts generate notifications.
DAlerts are ignored by the system.
Explanation
Setting 'Critical' indicates high-priority, actionable alerts that generate notifications.
Q154
Which service in VMware Carbon Black is primarily responsible for real-time monitoring of endpoints?
AResponse
BThreat Intelligence
CIncident Management
DRemediation
Explanation
Response provides continuous monitoring, while others focus on analysis or support.
Q155
You are configuring a Carbon Black Cloud sensor that must report back to the management console every 5 minutes. What setting should you adjust?
AHeartbeat Interval
BData Retention
CConnection Timeout
DAgent Registration
Explanation
The heartbeat interval determines how often the sensor communicates with the console.
Q156
A company needs to quickly identify potential malicious behavior across all endpoints. Which feature would be most beneficial?
ARansomware Protection
BBehavioral EDR
CManaged Defenses
DContainer Security
Explanation
Behavioral EDR analyzes actions and flags anomalies, unlike the others which serve different purposes.
Q157
Which service does VMware Carbon Black utilize for real-time threat detection?
ABehavioral analysis engine
BNetwork intrusion detection
CStatic analysis scanning
DVirtual machine isolation
Explanation
The behavioral analysis engine identifies threats in real-time through observed actions, while others do not primarily perform real-time analysis.
Q158
A security analyst notices unusual login attempts from multiple IPs. What should they investigate first?
AUser activity log
BDNS records
CMalware signatures
DFile integrity monitoring
Explanation
The user activity log can reveal underlying authentication practices and help identify potential account compromise before investigating other log sources.
Q159
You are configuring policies in VMware Carbon Black. What should be done to ensure the Data Retention Policy is compliant with regulations?
ASet retention to 12 months
BUse default settings blindly
CReview compliance requirements first
DKeep data indefinitely
Explanation
Always review compliance requirements first to tailor the retention period appropriately; the others are less informed choices that could lead to non-compliance.
Q160
Which service in VMware Carbon Black focuses on detecting and responding to endpoint threats?
AEndpoint Detection and Response
BCloud Security Services
CInfrastructure Management
DNetwork Security Monitoring
Explanation
Endpoint Detection and Response specifically targets endpoint threats, while the others serve different security aspects.