11.11 Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

VMware Certification 5V0-93.22 Updated Exam

Page: 4 / 5
Total 60 questions

VMware Carbon Black Cloud Endpoint Standard Skills Questions and Answers

Question 13

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

Options:

A.

All executable files in the "Program Files" folder and subfolders will be ignored, includingmalware files.

B.

No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.

C.

Executable files in the "Program Files" folder will be blocked.

D.

Only executable files in the "Program Files" folder will be ignored, includingmalware files.

Question 14

An administrator has determined that the following rule was the cause for an unexpected block:

[Suspected malware] [Invokes a command interpreter] [Terminate process]

All reputations for the process which was blocked show SUSPECT_MALWARE.

Which reputation was used by the sensor for the decision to terminate the process?

Options:

A.

Initial Cloud reputation

B.

Actioned reputation

C.

Current Cloud reputation

D.

Effective reputation

Question 15

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

Options:

A.

Users

B.

Audit Log

C.

Notifications

D.

Inbox

Question 16

A security administrator notices an unusual software behavior on an endpoint. The administrator immediately used the search query to collect data and start analyzing indicators to find the solution.

What is a pre-requisite step in gathering specific vulnerability data to export it as a CSV file for analysis?

Options:

A.

Perform a custom search on the Endpoint Page.

B.

Access the Audit Log content to see associated events.

C.

Search for specific malware byhash or filename.

D.

Enable cloud analysis.

Page: 4 / 5
Total 60 questions