VMware Related Exams
5V0-93.22 Exam
A user downloaded and executed malware on a system. The malware is actively exfiltrating data.
Which immediate action is recommended to prevent further exfiltration?
Which statement is true regarding Blocking/Isolation rules and Permission rules?
A VMware Carbon Black managed endpoint is showing up as an inactive device in the console.
What is the threshold, in days, before a machine shows as inactive?