11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

5V0-93.22 Exam Dumps - VMware Carbon Black Cloud Endpoint Standard Skills

Question # 4

A security administrator needs to remediate a security vulnerability that may affect the sensors. The administrator decides to use a tool that can provide interaction and remote access for further investigation.

Which tool is being used by the administrator?

A.

CBLauncher

B.

Live Response

C.

PowerCLI

D.

IRepCLI

Full Access
Question # 5

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

A.

All executable files in the "Program Files" folder and subfolders will be ignored, includingmalware files.

B.

No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.

C.

Executable files in the "Program Files" folder will be blocked.

D.

Only executable files in the "Program Files" folder will be ignored, includingmalware files.

Full Access
Question # 6

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Users\*\Downloads\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path for this rule?

A.

Any executable in the downloads directory for any user on the system will be logged and allowed to execute.

B.

No files will be ignored from the downloads directory.

C.

Any executable in the downloads directory for any user on the system will be bypassed for inspection.

D.

Any executable in the downloads directory will be prevented from executing.

Full Access
Question # 7

An administrator wants to prevent a spreadsheet from being misused to run malicious code, while minimizing the risk of breaking normal operations of a spreadsheet.

Which rule should be used?

A.

**\Microsoft Office\** [Runs external code] [Terminate process]

B.

**\excel.exe [Invokes a command interpreter] [Deny operation]

C.

**/Microsoft Excel.app/** [Communicates over the network] [Terminate process]

D.

**\excel.exe [Runs malware] [Deny operation]

Full Access
Question # 8

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

A.

The reputation is determined by cloud reputation.

B.

The sensor prompts the end user to allow or deny the file.

C.

The sensor automatically blocks the new file.

D.

The sensor is unable to block a malicious file.

Full Access
Question # 9

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

A.

A flexible query scheduler that can be used to gather information about the environment

B.

Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems

C.

Customizable threat feeds that plug into a single agent and single console

D.

Policy rules that can be tested by selecting test rule next to the desired operation attempt

Full Access
Question # 10

An administrator needs to find all events on the Investigate page where the process is svchost.exe, and the path is not the standard path of C:\Windows\System32.

Which advanced search will yield these results?

A.

process_name:svchost.exe EXCLUDE process_name:C\:\\Windows\\System32

B.

process_name:svchost.exe AND NOT process_name:C:\Windows\System32

C.

process_name:svchost.exe AND NOT process_name:C\:\\Windows\\System32

D.

process_name:svchost.exe EXCLUDE process_name:C:\Windows\System32

Full Access
Question # 11

An administrator wants to prevent ransomware that has not been seen before, without blocking other processes.

Which rule should be used?

A.

[Adware or PUP] [Scrapes memory of another process] [Deny operation]

B.

[Not listed application] [Performs ransomware-like behavior] [Terminate process

C.

[Unknown malware] [Runs or is running] [Terminate process]

D.

[Not listed application] [Runs or is running] [Terminate process]

Full Access
Question # 12

Which permission level is required when a user wants to install a sensor on a Windows endpoint?

A.

Everyone

B.

Administrator

C.

Root

D.

User

Full Access
Question # 13

An administrator is reviewing how event data is categorized and identified in VMware Carbon Black Cloud.

Which method is used?

A.

By Unique Process ID

B.

By Process Name

C.

By Unique Event ID

D.

By Event Name

Full Access
Question # 14

Where can a user identify whether a sensor's signature pack is out-of-date in VMware Carbon Black Cloud?

A.

Enforce > Investigate > Sensors > Details

B.

Enforce > Inventory > Endpoints > Policy

C.

Inventory > Endpoints > Sensor Update Status

D.

Inventory > Endpoints > Device Name

Full Access
Question # 15

An administrator needs to fully analyze the relevant information of an event stored in the VMware Carbon Black Cloud.

On which page can this information be found?

A.

Enforce

B.

Investigate

C.

Live Query

D.

Inventory

Full Access
Question # 16

An administrator has determined that the following rule was the cause for an unexpected block:

[Suspected malware] [Invokes a command interpreter] [Terminate process]

All reputations for the process which was blocked show SUSPECT_MALWARE.

Which reputation was used by the sensor for the decision to terminate the process?

A.

Initial Cloud reputation

B.

Actioned reputation

C.

Current Cloud reputation

D.

Effective reputation

Full Access
Question # 17

An administrator needs to make sure all files are scanned locally upon execution.

Which setting is necessary to complete this task?

A.

On-Access File Scan Mode must be set to Aggressive.

B.

Signature Update frequency must be set to 2 hours.

C.

Allow Signature Updates must be enabled.

D.

Run Background Scan must be set to Expedited.

Full Access
Question # 18

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

A.

Events and alerts are tagged with Carbon Black TTPs to provide context around attacks.

B.

Firewall rule configuration are provided in the environment.

C.

Data leakage protection (DLP) is enforced on endpoints or subsets of endpoints.

D.

Customized threat feeds can be combined with other outside threat intelligence sources.

Full Access