A company needs to enforce network segmentation for sensitive workloads. What is the recommended approach in VMware Carbon Black?
AUse network policies
BDisable all traffic
CSet up VPN only
DRegularly reboot servers
Explanation
Implementing network policies effectively enforces segmentation, while the other options are insufficient or unrelated.
Q72
What happens when a file is marked as 'malicious' in VMware Carbon Black EDR?
AIt is automatically deleted
BAlerts are generated
CNo action is taken
DFile access is encrypted
Explanation
Marking a file as malicious triggers alerts for further investigation; other options are inaccurate.
Q73
Which service in VMware Carbon Black EDR provides automated threat hunting capabilities?
AThreatHunter
BEventForwarder
CLogInsights
DThreatCheck
Explanation
ThreatHunter is designed for automated threat hunting, while the others serve different functions.
Q74
A company needs to ensure all agents are managed from a single console. Which Carbon Black solution should they implement?
ACarbon Black Cloud
BCB Response
CCB Defense
DCB ThreatSight
Explanation
Carbon Black Cloud allows centralized management of all agents, unlike others which focus on specific functions.
Q75
What happens when an endpoint's machine learning model gets retrained?
AIt loses previous data
BIts detection accuracy increases
CIt resets all configurations
DNo significant impact occurs
Explanation
Retraining generally enhances detection capabilities by updating the model with new threat data, unlike the other options which suggest negative impacts.
Q76
What happens when an endpoint initiates a process that is on the block list?
AThe endpoint process is terminated immediately.
BAn alert is generated and logged.
CThe process is allowed to run.
DThe endpoint is quarantined.
Explanation
The block list enforces immediate termination of the process, preventing malicious actions; alerts may follow but aren't immediate actions.
Q77
You are configuring a detection rule for suspicious file modifications. Which option is critical for rule accuracy?
ASpecify user roles with access.
BIdentify trusted application sources.
CDefine the file types monitored.
DSet the time of day for scans.
Explanation
Defining file types ensures the detection rule focuses on relevant changes, while the other options do not directly impact the detection specifics.
Q78
Which service in VMware Carbon Black helps in threat hunting?
AIntelligence Services
BLive Response
CEvent Analysis
DDevice Control
Explanation
Event Analysis provides detailed logs and context useful for effective threat hunting; other services support other functionalities.
Q79
Which service allows for remote investigation of endpoint threats in Carbon Black?
ARemote Live Response
BThreat Intelligence
CPolicy Management
DIntegration Services
Explanation
Remote Live Response allows real-time threat investigation, while the others focus on different functions.
Q80
A company needs to ensure compliance with regulations regarding data handling. What specific feature in Carbon Black should they focus on?
AData Loss Prevention
BBehavioral EDR
CAudit Logs
DVMware Fusion
Explanation
Audit Logs provide traceability essential for compliance, unlike DLP which focuses on data protection.