A company needs to isolate a compromised endpoint securely. What should they use?
AVMware vMotion
BVMware NSX Segmentation
CVMware Fusion Networking
DVMware Site Recovery
Explanation
VMware NSX Segmentation allows secure isolation of compromised endpoints.
Q132
What happens when you enable Application Control in VMware Security?
AAll applications are blocked immediately
BOnly signed applications can run
COnly system applications are allowed
DAll applications are allowed by default
Explanation
Enabling Application Control typically restricts execution to signed applications only, enhancing security.
Q133
Which service provides endpoint threat detection in VMware security?
AVMware Carbon Black
BVMware vSphere
CVMware Horizon
DVMware NSX
Explanation
VMware Carbon Black is specifically designed for endpoint detection and response, while others focus on virtualization and networking.
Q134
A company needs to ensure data confidentiality in its virtual environment. Which feature should they enable?
AData Loss Prevention
BVirtual Machine Encryption
CNetwork Segmentation
DFirewall Configuration
Explanation
Virtual Machine Encryption directly protects data within VMs against unauthorized access, unlike the other options.
Q135
What happens when you enable real-time monitoring in VMware security?
AReduces system performance
BIncreases alert accuracy
CDecreases false positives
DStops all background processes
Explanation
Real-time monitoring can consume resources, potentially impacting system performance, while other options are not direct outcomes.
Q136
Which service in VMware Carbon Black focuses on persistent endpoint visibility?
AEvent Monitoring Services
BThreat Intelligence Service
CEndpoint Detection and Response
DReal-Time Behavioral Analysis
Explanation
Endpoint Detection and Response provides continuous visibility and monitoring of endpoints, while others focus on specific detections or analysis.
Q137
A company needs to ensure that only approved applications run on its endpoints. Which solution should they implement?
AApplication Whitelisting
BBehavioral Analysis
CFull Disk Encryption
DEndpoint Backup Solutions
Explanation
Application Whitelisting explicitly allows only approved applications, whereas the others do not prevent unapproved applications from running.
Q138
You are configuring VMware Carbon Black policies. What happens when you set a policy to 'Block'?
AQuarantine only detected threats
BAllow all applications to run
CPrevent listed applications from executing
DSend alerts without blocking
Explanation
'Block' policies prevent specified applications from running, whereas others either allow execution, quarantine, or only alert.
Q139
Which service is utilized for advanced threat detection in VMware Carbon Black?
AThreat Intelligence
BEndpoint Detection Response
CNetwork Segmentation
DUser Behavior Analytics
Explanation
Endpoint Detection Response analyzes endpoint activities for threats, while the others serve different purposes.
Q140
A company needs to protect sensitive data on employee devices. What should be the first step?
AImplement data encryption.
BDeploy web filtering.
CApply endpoint rules.
DConduct employee training.
Explanation
Implementing data encryption is crucial for securing sensitive data, while the others enhance security but do not directly protect the data itself.