A company needs to ensure minimal impact on user experience during endpoint security scans; what configuration should they prioritize?
AFull scans only
BScheduled scans during off-peak hours
CConstant background scanning
DDisabling all scans
Explanation
Scheduled scans during off-peak hours minimizes user disruption, unlike constant scanning or no scans.
Q42
What happens when an endpoint fails to report back to the VMware Carbon Black server?
AIt is immediately quarantined.
BAlerts are generated for missed data.
CThe endpoint is labeled as compromised.
DData becomes permanently inaccessible.
Explanation
Alerts help monitor endpoint status; quarantine or label actions occur under specific threat conditions.
Q43
Which service is primarily responsible for endpoint visibility in VMware Carbon Black EDR?
AEndpoint Data Collection
BReal-Time Response
CThreat Intelligence
DSecurity Policy Management
Explanation
Endpoint Data Collection captures and sends endpoint data for visibility, while others serve different functions.
Q44
A company needs to ensure that only specific applications run on their endpoints. Which feature should they implement?
AFile Integrity Monitoring
BApplication Control
CIncident Response
DBehavior Monitoring
Explanation
Application Control restricts executable applications, while the others focus on monitoring or responding to incidents.
Q45
What happens when you enable "Prevent Uninstall" on the Carbon Black agent?
AUser can uninstall intentionally
BAgent cannot be stopped or removed
CApplication updates are blocked
DUsers can disable this feature easily
Explanation
Enabling "Prevent Uninstall" protects the agent from being uninstalled, unlike the other scenarios.
Q46
Which service in Carbon Black EDR provides real-time threat intelligence?
AThreat Intelligence Cloud
BIncident Response Platform
CResponse Management Console
DFile Integrity Monitoring
Explanation
Threat Intelligence Cloud offers real-time data for threat detection, while the others serve different functions.
Q47
A company needs to enforce application allowlisting across its endpoints. Which feature should they configure?
AMalicious Behavior Detection
BApplication Control Policies
CDynamic Query Processor
DFile Hashing Mechanism
Explanation
Application Control Policies specifically manage application allowlisting, unlike the other features.
Q48
What happens when a new endpoint connects to the Carbon Black platform?
AIt bypasses all security checks.
BIt automatically gets quarantined.
CIt starts sending telemetry data.
DIt is ignored until manually approved.
Explanation
New endpoints immediately begin sending telemetry data for analysis; others are incorrect scenarios.
Q49
Which service provides real-time data inspection in Carbon Black?
AData forensics
BThreat intelligence
CBehavioral analysis
DEndpoint threat detection
Explanation
Endpoint threat detection utilizes real-time data inspection to monitor threats, while the others serve different functions.
Q50
A company needs to ensure compliance with data privacy regulations. What feature should they use in Carbon Black?
ADevice Control
BIncident Response
CData Loss Prevention
DManaged Detection
Explanation
Data Loss Prevention helps in compliance by preventing unauthorized data access, whereas the other options focus on varying aspects of threat management.