Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

VMware 5V0-93.22 Dumps

Page: 1 / 6
Total 60 questions

VMware Carbon Black Cloud Endpoint Standard Skills Questions and Answers

Question 1

A security administrator needs to remediate a security vulnerability that may affect the sensors. The administrator decides to use a tool that can provide interaction and remote access for further investigation.

Which tool is being used by the administrator?

Options:

A.

CBLauncher

B.

Live Response

C.

PowerCLI

D.

IRepCLI

Question 2

A company wants to prevent an executable from running in their organization. The current reputation for the file is NOT LISTED, and the machines are in the default standard policy.

Which action should be taken to prevent the file from executing?

Options:

A.

Add the hash to the MALWARE list.

B.

Use Live Response to kill the process.

C.

Use Live Response to delete the file.

D.

Add the hash to the company banned list.

Question 3

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

Options:

A.

All executable files in the "Program Files" folder and subfolders will be ignored, includingmalware files.

B.

No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.

C.

Executable files in the "Program Files" folder will be blocked.

D.

Only executable files in the "Program Files" folder will be ignored, includingmalware files.

Question 4

An administrator is reviewing how event data is categorized and identified in VMware Carbon Black Cloud.

Which method is used?

Options:

A.

By Unique Process ID

B.

By Process Name

C.

By Unique Event ID

D.

By Event Name

Question 5

An organization is seeing a new malicious process that has not been seen before.

Which tool can be used to block this process?

Options:

A.

Policy rules

B.

Malware Removal

C.

Certificate banned list

D.

Live Response

Question 6

An administrator needs to find all events on the Investigate page where the process is svchost.exe, and the path is not the standard path of C:\Windows\System32.

Which advanced search will yield these results?

Options:

A.

process_name:svchost.exe EXCLUDE process_name:C\:\\Windows\\System32

B.

process_name:svchost.exe AND NOT process_name:C:\Windows\System32

C.

process_name:svchost.exe AND NOT process_name:C\:\\Windows\\System32

D.

process_name:svchost.exe EXCLUDE process_name:C:\Windows\System32

Question 7

An organization has the following requirements for allowing application.exe:

asMust not work for any user's D:\ drive

asMust allow running only from inside of the user's Temp\Allowed directory

asMust not allow running from anywhere outside of Temp\Allowed

For example, on one user's machine, the path is C:\Users\Lorie\Temp\Allowed\application.exe.

Which path meets this criteria using wildcards?

Options:

A.

C:\Users\?\Temp\Allowed\application.exe

B.

C:\Users\*\Temp\Allowed\application.exe

C.

*:\Users\**\Temp\Allowed\application.exe

D.

*:\Users\*\Temp\Allowed\application.exe

Question 8

An administrator has just placed an endpoint into bypass.

What type of protection, if any, will VMware Carbon Black provide this device?

Options:

A.

VMware Carbon Black will be uninstalled from the endpoint.

B.

VMware Carbon Black will place the machine in quarantine.

C.

VMware Carbon Black will not provide any protection to the endpoint.

D.

VMware Carbon Black will apply policy rules.

Question 9

Which VMware Carbon Black Cloud integration is supported for SIEM?

Options:

A.

SolarWinds

B.

LogRhythm

C.

Splunk App

D.

Datadog

Question 10

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

Options:

A.

Users

B.

Audit Log

C.

Notifications

D.

Inbox

Question 11

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

Options:

A.

A flexible query scheduler that can be used to gather information about the environment

B.

Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems

C.

Customizable threat feeds that plug into a single agent and single console

D.

Policy rules that can be tested by selecting test rule next to the desired operation attempt

Question 12

An administrator wants to prevent malicious code that has not been seen before from retrieving credentials from the Local Security Authority Subsystem Service, without causing otherwise good applications from being blocked.

Which rule should be used?

Options:

A.

[Unknown application] [Retrieves credentials] [Terminate process]

B.

[**/*.exe] [Scrapes memory of another process] [Terminate process]

C.

[**\lsass.exe] [Scrapes memory of another process] [Deny operation]

D.

[Not listed application] [Scrapes memory of another process] [Terminate process]

Question 13

Is it possible to search for unsigned files in the console?

Options:

A.

Yes, by using the search:

NOT process_publisher_state:FILE_SIGNATURE_STATE_SIGNED

B.

No, it is not possible to return a query for unsigned files.

C.

Yes, by using the search:

process_publisher_state:FILE_SIGNATURE_STATE_UNSIGNED

D.

Yes, by looking at signed and unsigned executables in the environment and seeing if another difference can be found, thus locating unsigned files in the environment.

Question 14

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

Options:

A.

The reputation is determined by cloud reputation.

B.

The sensor prompts the end user to allow or deny the file.

C.

The sensor automatically blocks the new file.

D.

The sensor is unable to block a malicious file.

Question 15

An administrator is tasked to create a reputation override for a company-critical application based on the highest available priority in the reputation list. The company-critical application is already known by VMware Carbon Black.

Which method of reputation override must the administrator use?

Options:

A.

Signing Certificate

B.

Hash

C.

Local Approved

D.

IT Tool

Question 16

An organization has found application.exe running on some machines in their Workstations policy. Application.exe has a SUSPECT_MALWARE reputation and runs from C:\Program Files\IT\Tools. The Workstations policy has the following rules which could apply:

Blocking and Isolation Rule

asApplication on the company banned list > Runs or is running > Deny

asKnown malware > Runs or is running > Deny

asSuspect malware > Runs or is running > Terminate

Permissions Rule

asC:\Program Files\IT\Tools\* > Performs any operation > Bypass

Which action, if any, should an administrator take to ensure application.exe cannot run?

Options:

A.

Change the reputation to KNOWN MALWARE to a higher priority.

B.

No action needs to be taken as the file will be blocked based on reputation alone.

C.

Remove the Permissions rule for C:\Program FilesMTVToolsV.

D.

Add the hash to the company banned list at a higher priority.

Question 17

An administrator has determined that the following rule was the cause for an unexpected block:

[Suspected malware] [Invokes a command interpreter] [Terminate process]

All reputations for the process which was blocked show SUSPECT_MALWARE.

Which reputation was used by the sensor for the decision to terminate the process?

Options:

A.

Initial Cloud reputation

B.

Actioned reputation

C.

Current Cloud reputation

D.

Effective reputation

Question 18

An administrator wants to prevent ransomware that has not been seen before, without blocking other processes.

Which rule should be used?

Options:

A.

[Adware or PUP] [Scrapes memory of another process] [Deny operation]

B.

[Not listed application] [Performs ransomware-like behavior] [Terminate process

C.

[Unknown malware] [Runs or is running] [Terminate process]

D.

[Not listed application] [Runs or is running] [Terminate process]

Page: 1 / 6
Total 60 questions