A company needs to customize event reporting in Carbon Black. What should they configure first?
AAlerts Configuration
BSensor Policies
CData Retention Settings
DReport Templates
Explanation
Configuring Report Templates allows customization of reports; the other options do not directly create reports.
Q12
What happens when an endpoint reaches its maximum allowed storage for Carbon Black logs?
AOld logs are deleted automatically
BLogging stops until space is freed
CSystem generates an alert only
DNew logs overwrite recent logs
Explanation
Carbon Black deletes old logs automatically to manage storage; logging stopping is not the default behavior.
Q13
Which service in VMware Carbon Black provides real-time visibility into endpoint behavior?
AEndpoint Detection and Response
BCloud Config Management
CUser Behavior Analytics
DNetwork Traffic Analysis
Explanation
Endpoint Detection and Response (EDR) offers real-time monitoring of endpoints; the other options are not primary functions of VMware Carbon Black.
Q14
A company needs to reduce the threat of ransomware. What feature should they enable in Carbon Black?
AApplication Control
BDetective Sensor
CTask Kill Action
DFile Integrity Monitoring
Explanation
Application Control can prevent unauthorized applications, including ransomware, while the other features do not specifically mitigate ransomware threats.
Q15
What happens when a sensor fails to report status in Carbon Black?
AThe endpoint is quarantined
BNo alerts are generated
CThreat hunting is disabled
DAlert on potential problems raised
Explanation
The system will generate alerts for missing status reports, while the other options are incorrect as they misrepresent the system's behavior.
Q16
Which service in VMware Carbon Black EDR is responsible for data collection and analysis from endpoints?
AData Service
BResponse Service
CDetection Service
DCollection Service
Explanation
Data Service collects and analyzes endpoint data; others do not specifically relate to data ingestion.
Q17
A company needs to filter out untrusted applications during threat detection. What feature should they use?
AApplication Control
BThreat Intelligence
CBehavioral Monitoring
DEndpoint Isolation
Explanation
Application Control restricts untrusted applications; others have different functions.
Q18
What happens when you enable prevention mode for an endpoint in VMware Carbon Black EDR?
AOnly alerts are triggered
BThreats are automatically blocked
CData collection stops
DUser gets logged out
Explanation
Prevention mode actively blocks threats; other options do not accurately reflect its function.
Q19
Which service allows VMware Carbon Black to store and manage detection data?
ACloud storage service
BLocal database service
CHybrid cloud solution
DOn-premises sensor storage
Explanation
The cloud storage service centralizes detection data for enhanced analysis; local and on-premises options limit accessibility.
Q20
A company needs to prevent data exfiltration through USB devices. Which feature of Carbon Black would best meet this requirement?
ADevice control policy
BBehavioral analysis
CEndpoint lockdown
DWeb filtering
Explanation
Device control policies specifically manage USB access, while other options do not directly address physical device usage.