What happens when a hash of a file is deemed malicious in Carbon Black?
AFile is automatically deleted
BAn alert is generated
CAll similar files are removed
DNo action is taken
Explanation
When a file's hash is flagged, it triggers an alert for security personnel to investigate, but it does not act on files automatically.
Q22
Which service does VMware Carbon Black rely on for incident response data collection?
AData Collection Service
BThreat Intelligence Platform
CIncident Response Engine
DCompliance Monitoring Tool
Explanation
The Data Collection Service gathers endpoint incident data for analysis, while others do not serve this primary function.
Q23
A company needs to ensure all endpoints have the latest security policies applied. What should be configured?
AReal-time policy update
BHistorical policy review
CStatistical policy analysis
DPolicy version control
Explanation
Real-time policy updates ensure immediate enforcement on all endpoints, unlike the others which do not apply policies directly.
Q24
What happens when a potentially harmful file is quarantined in VMware Carbon Black?
AFile remains accessible to users
BThreat status is downgraded
CUser receives a notification
DFile is deleted permanently
Explanation
Users receive notifications regarding quarantined files but the file does not remain accessible, nor is it deleted permanently unless specified.
Q25
Which service in VMware Carbon Black is primarily responsible for threat intelligence?
AThreat Intelligence Cloud
BBehavioral Analytics
CIncident Response
DFile Integrity Monitoring
Explanation
Threat Intelligence Cloud aggregates and analyzes threat data, while the other options focus on different protective functions.
Q26
A company needs to prevent unauthorized file modifications; which feature should they configure in Carbon Black?
AWatchlist
BMalware Protection
CFile Integrity Monitoring
DEndpoint Firewall
Explanation
File Integrity Monitoring detects and alerts on unauthorized changes, unlike the other options.
Q27
What happens when you disable process whitelisting in Carbon Black?
AAll processes are blocked
BAll processes are allowed
CCritical processes stop functioning
DAlerts will decrease significantly
Explanation
Disabling whitelisting permits all processes, while the other options are misleading or incorrect.
Q28
Which service in VMware Carbon Black handles threat hunting?
AThreatHunter
BLiveResponse
CSensor Management
DAPI Access
Explanation
ThreatHunter focuses specifically on threat hunting, while others serve different functions.
Q29
A company needs to protect its endpoints on the cloud. Which Carbon Black solution should they implement?
ACarbon Black Cloud
BCarbon Black Response
CCarbon Black Predictive
DCarbon Black Fortify
Explanation
Carbon Black Cloud provides cloud-native endpoint protection, unlike the other options.
Q30
What happens when a suspicious file is quarantined in Carbon Black?
AIt is deleted permanently
BIt is scanned again
CIt's analyzed by AI algorithms
DIt is isolated from the system
Explanation
Quarantining isolates the file to prevent harm while allowing analysis.