What happens when a suspicious file is detected by Carbon Black's prevention policies?
AFile is automatically quarantined
BAlert is only generated
CSystem shutdown initiated
DAntivirus software scans begin
Explanation
Automatically quarantining helps prevent execution of threats, while others do not provide adequate immediate action.
Q82
Which service in VMware Carbon Black provides real-time visibility and analysis of security alerts?
AThreat Analysis
BSensor Management
CIncident Response
DLive Response
Explanation
Threat Analysis enables visibility and analysis of alerts, while the other options involve different functionalities within the platform.
Q83
A company needs to isolate a compromised endpoint for investigation. What should be the first step?
ADisable network connectivity
BAnalyze system logs
CRestart the endpoint
DUpdate all security policies
Explanation
Isolating the endpoint by disabling connectivity is crucial to prevent further harm; the other options are secondary actions.
Q84
You are configuring a new policy in Carbon Black. What setting should you prioritize to minimize false positives?
AHigh sensitivity for detections
BReputation-based rules
CSystem performance metrics
DDefault alert settings
Explanation
Reputation-based rules focus on known threats, reducing false positives compared to higher sensitivity or default settings.
Q85
Which service in VMware Carbon Black is responsible for monitoring endpoint activity?
AActivity Monitoring Service
BEndpoint Threat Detection
CEndpoint Detection and Response
DMalware Analysis Tool
Explanation
Endpoint Detection and Response is the service specifically designed for monitoring endpoint activity, while the others serve different functions.
Q86
A company needs to respond to a ransomware alert. What should be the immediate action?
AIsolate affected endpoints
BUpdate software immediately
CSend to users for review
DContact the vendor for guidance
Explanation
Isolating affected endpoints prevents spread; other options are slower responses that may allow ransomware to propagate.
Q87
You are configuring threat types in Carbon Black. What is a consequence of selecting 'Low' severity for a threat?
ANo action will be taken
BThreat will be ignored permanently
CAutomatic quarantine is initiated
DAlerts are logged but not prioritized
Explanation
Choosing 'Low' severity logs alerts without immediate action; the other options suggest automatic or permanent responses which do not correspond with low severity settings.
Q88
Which service provides advanced threat hunting in VMware Carbon Black EDR?
AThreatHunter
BEndpoint Analytics
CPolicy Management
DIncident Response
Explanation
ThreatHunter is designed specifically for advanced threat hunting; the other options focus on different functionalities.
Q89
A company needs to comply with data privacy regulations. Which feature of VMware Carbon Black EDR should they utilize?
APrivacy Alerts
BData Retention Policy
CUser Activity Monitoring
DAlert Rules
Explanation
The Data Retention Policy helps ensure compliance with data privacy regulations, unlike the other features.
Q90
You are configuring a custom alert in Carbon Black. What happens when you set the threshold to '0'?
ANo alerts generated
BAlerts for all activities
COnly high-risk alerts
DDaily summary report
Explanation
Setting the threshold to '0' means alerts will trigger for all recorded activities, invalidating other thresholds.