Which service provides threat information and intelligence in VMware Carbon Black?
AThreat Intelligence Cloud
BCarbon Black Endpoint Protection
CIncident Response Console
DManaged Threat Hunting
Explanation
Threat Intelligence Cloud aggregates and analyzes threat data, unlike the other options which focus on specific functionalities.
Q182
You are configuring a sensor for a critical production environment. Which setting should you prioritize to reduce false positives?
AMemory tampering detection
BFile integrity checking
CWatchlist configuration
DContinuous monitoring mode
Explanation
Watchlist configuration allows precision in detection, while others might increase false alerts.
Q183
What happens when an endpoint is disconnected from the network while using Carbon Black?
AIt cannot report any logs
BIt uses local policy changes only
CIt stops monitoring for threats
DIt deletes existing data
Explanation
The endpoint continues to operate under local policy until it reconnects, unlike the other options which inaccurately represent functionality.
Q184
Which service in VMware Carbon Black is responsible for threat intelligence feeds?
ACB Threat Intelligence
BCB Application Control
CCB EDR Monitoring
DCB Device Control
Explanation
CB Threat Intelligence provides external cybersecurity data, while the others manage applications or devices.
Q185
A company needs to ensure that sensitive files are only accessible by specific users across all endpoints. Which Carbon Black feature should they implement?
AFile Integrity Monitoring
BPolicy Management
CUser Roles and Permissions
DEndpoint Visibility
Explanation
User Roles and Permissions control access, unlike the other options that don't restrict user access.
Q186
What happens when a file is marked as 'trusted' in Carbon Black?
AIt is automatically deleted.
BIt bypasses security controls.
CIt receives constant monitoring.
DIt is sent for advanced analysis.
Explanation
Trusted files bypass certain security controls, unlike the monitoring and analysis options.
Q187
Which service in VMware Carbon Black provides real-time visibility of endpoint activity?
AEvent Monitoring Service
BThreat Analysis Service
CEndpoint Protection Service
DIncident Response Dashboard
Explanation
Event Monitoring Service offers real-time endpoint activity insights; the other options do not specifically address real-time visibility.
Q188
A company needs to reduce false positive alerts in Carbon Black. What should they do?
ALower alert sensitivity settings
BWhitelist known good files
CDisable all alert notifications
DIncrease data retention period
Explanation
Whitelisting known good files can significantly reduce false positives, whereas the other options might compromise security or provide no benefit.
Q189
You are configuring a Carbon Black response rule. What happens when a rule is set to auto-remediate?
AIt logs incidents for review
BIt automatically blocks the file
CIt isolates the endpoint immediately
DIt triggers an external alert
Explanation
Auto-remediation rules automatically block the detected file; the other options do not reflect auto-remediation behavior.
Q190
Which Carbon Black module is used for live response?
ALive Response
BThreat Hunting
CContainment
DRemediation
Explanation
Live Response allows real-time actions on endpoints; the other options do not focus on immediate endpoint actions.