Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

VMware 5V0-93.22 - VMware Carbon Black Cloud Endpoint Standard Skills

Page: 1 / 2
Total 60 questions

An administrator wants to find information about real-world prevention rules that can be used in VMware Carbon Black Cloud Endpoint Standard.

How can the administrator obtain this information?

A.

Refer to an external report from other security vendors to obtain solutions.

B.

Refer to the TAU-TIN's on the VMware Carbon Black community page.

C.

Refer to the VMware Carbon Black Cloud sensor install guide.

D.

Refer to VMware Carbon Black Cloud user guide.

In which tab of the VMware Carbon Black Cloud interface can sensor status details be found?

A.

Enforce > Policies

B.

Inventory > Sensors

C.

Inventory > Endpoints

D.

Inventory > Sensor groups

Which scenario would qualify for the "Local White" Reputation?

A.

The file was added as an IT took

B.

The file was signed using a trusted certificate.

C.

The hash was not on any known good or known bad lists, AND the file is signed.

D.

The hash was previously analyzed, AND it is not on any known good or bad lists.

An organization is implementing policy rules. The administrator mentions that one operation attempt must use a Terminate Process action.

Which operation attempt has this requirement?

A.

Performs ransom ware-like behavior

B.

Runs or is running

C.

Scrapes memory of another process

D Invokes a command interpreter

An administrator needs to create a search, but it must exclude "system.exe".

How should this task be completed?

A.

#process_name:system.exe

B.

*process_name:system.exe

C.

D.

-process_name:system.exe

An administrator is reviewing how event data is categorized and identified in VMware Carbon Black Cloud.

Which method is used?

A.

By Unique Process ID

B.

By Process Name

C.

By Unique Event ID

D.

By Event Name

An administrator wants to prevent malicious code that has not been seen before from retrieving credentials from the Local Security Authority Subsystem Service, without causing otherwise good applications from being blocked.

Which rule should be used?

A.

[Unknown application] [Retrieves credentials] [Terminate process]

B.

[**/*.exe] [Scrapes memory of another process] [Terminate process]

C.

[**\lsass.exe] [Scrapes memory of another process] [Deny operation]

D.

[Not listed application] [Scrapes memory of another process] [Terminate process]

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

A.

The reputation is determined by cloud reputation.

B.

The sensor prompts the end user to allow or deny the file.

C.

The sensor automatically blocks the new file.

D.

The sensor is unable to block a malicious file.

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

A.

Users

B.

Audit Log

C.

Notifications

D.

Inbox

An administrator wants to be notified when particular Tactics, Techniques, or Procedures (TTPs) are observed on a managed endpoint.

Which notification option must the administrator configure to receive this notification?

A.

Alert that crosses a threshold with the "observed" option selected

B.

Alert that includes specific TTPs

C.

Alert for a Watchlist hit

D.

Policy action that is enforced with the "deny" opt ion selected