A company needs to investigate suspicious activity on endpoints. What should be the first step using VMware Carbon Black?
AAnalyze the audit logs
BCreate a watchlist
CRun a full system scan
DReview threat dashboards
Explanation
Analyzing audit logs provides critical insights into suspicious activities.
Q162
You are configuring the sensor settings for endpoints in VMware Carbon Black. What happens if you disable the 'block' action?
AEndpoints will be unmonitored
BMalicious files will not be blocked
CThreat alerts will stop
DPerformance will be improved
Explanation
Disabling the 'block' action allows malicious files to run unabated, whereas other options are incorrect regarding their impacts.
Q163
Which service in VMware Carbon Black provides threat intelligence data?
AThreat Intelligence
BFile Integrity Monitoring
CIncident Response
DSecurity Operations
Explanation
Threat Intelligence offers comprehensive threat data, while others serve different security functions.
Q164
A company needs to mitigate the impact of ransomware attacks. Which feature should they enable in Carbon Black?
ABehavioral Detection
BFile Encryption
CNetwork Segmentation
DUser Training
Explanation
Behavioral Detection identifies ransomware patterns, unlike the other options which serve different purposes.
Q165
You are configuring application control policies in Carbon Black. What happens when an application is on the Allow List?
AIt may be automatically blocked.
BIt can never be executed.
CIt runs without restrictions.
DIt is monitored only.
Explanation
Applications on the Allow List run without restrictions, while others are not allowed to run.
Q166
Which service does VMware Carbon Black primarily use for threat intelligence?
AThreat Analysis Cloud
BCarbon Black Standard
CEndpoint Protection Cloud
DSecurity Operations Center
Explanation
Threat Analysis Cloud provides comprehensive threat intelligence, while the others are related but do not primarily focus on threat intelligence.
Q167
A company needs to block traffic originating from a specific geographic region. What feature in Carbon Black can accomplish this?
AThreat Detection Rules
BGeo-Blocking Policies
CEvent Forwarding
DSensor Configuration
Explanation
Geo-Blocking Policies specifically target and restrict traffic from defined locations, whereas the other options focus on different functionalities.
Q168
You are configuring a carbon black sensor to operate in kernel mode. What happens when you enable this mode?
AHigher resource consumption
BIncreased detection capabilities
CDisables file system monitoring
DPrevents application whitelisting
Explanation
Kernel mode allows deeper integration for improved detection, while the others either state incorrect outcomes or are unrelated to kernel mode functionality.
Q169
Which service of VMware Carbon Black provides advanced threat hunting capabilities?
AThreat Analysis
BCB ThreatHunter
CIncident Response
DForensic Analysis
Explanation
CB ThreatHunter offers powerful tools for advanced threat hunting, while the others do not focus specifically on this functionality.
Q170
A company needs to enable secure remote access for employees using VMware Carbon Black. What should they configure?
ADevice Control
BVPN Integration
CApplication Control
DAlert Settings
Explanation
VPN Integration is essential for secure remote access, unlike the other options which serve different purposes.