Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

5V0-93.22 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

5V0-93.22 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: VMware Carbon Black Cloud Endpoint Standard Skills
  • Last Update: May 7, 2024
  • Questions and Answers: 60
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

5V0-93.22 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

5V0-93.22 Practice Exam Questions with Answers VMware Carbon Black Cloud Endpoint Standard Skills Certification

Question # 6

Which VMware Carbon Black Cloud integration is supported for SIEM?

A.

SolarWinds

B.

LogRhythm

C.

Splunk App

D.

Datadog

Full Access
Question # 7

An administrator has determined that the following rule was the cause for an unexpected block:

[Suspected malware] [Invokes a command interpreter] [Terminate process]

All reputations for the process which was blocked show SUSPECT_MALWARE.

Which reputation was used by the sensor for the decision to terminate the process?

A.

Initial Cloud reputation

B.

Actioned reputation

C.

Current Cloud reputation

D.

Effective reputation

Full Access
Question # 8

A security administrator is tasked to investigate an alert about a suspicious running process trying to modify a system registry.

Which components can be checked to further inspect the cause of the alert?

A.

Command lines. Device ID, and priority score

B.

Event details, command lines, and TTPs involved

C.

TTPs involved, network connections, and child path

D.

Priority score, file reputation, and timestamp

Full Access
Question # 9

Which port does the VMware Carbon Black sensor use to communicate to VMware Carbon Black Cloud?

A.

443

B.

80

C.

8443

D.

22

Full Access
Question # 10

An administrator wants to block an application by its path instead of reputation. The following steps have already been taken:

Go to Enforce > Policies > Select the desired policy >

Which additional steps must be taken to complete the task?

A.

Click Enforce > Add application path name

B.

Scroll down to the Permissions section > Click Add application path > Enter the path of the desired application

C.

Scroll down to the Blocking and Isolation section > Click Edit (pencil icon) for the desired Reputation

D.

Scroll down to the Blocking and Isolation section > Click Add application path > Enter the path of the desired application

Full Access
Question # 11

An administrator is working in a development environment that has a policy rule applied and notices that there are too many blocks. The administrator takes action on the policy rule to troubleshoot the issue until the blocks are fixed.

Which action should the administrator take?

A.

Unenforce

B.

Disable

C.

Recall

D.

Delete

Full Access
Question # 12

Where can a user identify whether a sensor's signature pack is out-of-date in VMware Carbon Black Cloud?

A.

Enforce > Investigate > Sensors > Details

B.

Enforce > Inventory > Endpoints > Policy

C.

Inventory > Endpoints > Sensor Update Status

D.

Inventory > Endpoints > Device Name

Full Access
Question # 13

An administrator would like to proactively know that something may get blocked when putting a policy rule in the environment.

How can this information be obtained?

A.

Search the data using the test rule functionality.

B Examine log files to see what would be impacted

B.

Put the rules in and see what happens to the endpoints.

D Determine what would happen based on previously used antivirus software

Full Access
Question # 14

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

A.

A flexible query scheduler that can be used to gather information about the environment

B.

Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems

C.

Customizable threat feeds that plug into a single agent and single console

D.

Policy rules that can be tested by selecting test rule next to the desired operation attempt

Full Access
Question # 15

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Users\*\Downloads\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path for this rule?

A.

Any executable in the downloads directory for any user on the system will be logged and allowed to execute.

B.

No files will be ignored from the downloads directory.

C.

Any executable in the downloads directory for any user on the system will be bypassed for inspection.

D.

Any executable in the downloads directory will be prevented from executing.

Full Access
Question # 16

The use of leading wildcards in a query is not recommended unless absolutely necessary because they carry a significant performance penalty for the search.

What is an example of a leading wildcard?

A.

filemod:system32/ntdll.dll

B.

filemod:system32/*ntdll.dll

C.

filemod:*/system32/ntdll.dll

D.

filemod:system32/ntdll.dll*

Full Access
Question # 17

An administrator needs to make sure all files are scanned locally upon execution.

Which setting is necessary to complete this task?

A.

On-Access File Scan Mode must be set to Aggressive.

B.

Signature Update frequency must be set to 2 hours.

C.

Allow Signature Updates must be enabled.

D.

Run Background Scan must be set to Expedited.

Full Access
Question # 18

An administrator has just placed an endpoint into bypass.

What type of protection, if any, will VMware Carbon Black provide this device?

A.

VMware Carbon Black will be uninstalled from the endpoint.

B.

VMware Carbon Black will place the machine in quarantine.

C.

VMware Carbon Black will not provide any protection to the endpoint.

D.

VMware Carbon Black will apply policy rules.

Full Access