Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

5V0-93.22 Exam Dumps - VMware Certification Questions and Answers

Question # 4

A company wants to prevent an executable from running in their organization. The current reputation for the file is NOT LISTED, and the machines are in the default standard policy.

Which action should be taken to prevent the file from executing?

Options:

A.

Add the hash to the MALWARE list.

B.

Use Live Response to kill the process.

C.

Use Live Response to delete the file.

D.

Add the hash to the company banned list.

Buy Now
Question # 5

An organization has the following requirements for allowing application.exe:

Must not work for any user's D:\ drive

Must allow running only from inside of the user's Temp\Allowed directory

Must not allow running from anywhere outside of Temp\Allowed

For example, on one user's machine, the path is C:\Users\Lorie\Temp\Allowed\application.exe.

Which path meets this criteria using wildcards?

Options:

A.

C:\Users\?\Temp\Allowed\application.exe

B.

C:\Users\*\Temp\Allowed\application.exe

C.

*:\Users\**\Temp\Allowed\application.exe

D.

*:\Users\*\Temp\Allowed\application.exe

Buy Now
Question # 6

Is it possible to search for unsigned files in the console?

Options:

A.

Yes, by using the search:

NOT process_publisher_state:FILE_SIGNATURE_STATE_SIGNED

B.

No, it is not possible to return a query for unsigned files.

C.

Yes, by using the search:

process_publisher_state:FILE_SIGNATURE_STATE_UNSIGNED

D.

Yes, by looking at signed and unsigned executables in the environment and seeing if another difference can be found, thus locating unsigned files in the environment.

Buy Now
Question # 7

A recent application has been blocked using hash ban, which is an indicator that some users attempted an unexpected activity. Even though the activity was blocked, the security administrator wants to further investigate the attempt in VMware Carbon Black Cloud Endpoint Standard.

Which page should the administrator navigate to for a graphical view of the event?

Options:

A.

Audit Log

B.

Watchlists

C.

Process Analysis

D.

Alert Triage

Buy Now
Question # 8

An organization is implementing policy rules. The administrator mentions that one operation attempt must use a Terminate Process action.

Which operation attempt has this requirement?

Options:

A.

Performs ransom ware-like behavior

B.

Runs or is running

C.

Scrapes memory of another process

D Invokes a command interpreter

Buy Now
Question # 9

An administrator wants to block ransomware in the organization based on leadership's growing concern about ransomware attacks in their industry.

What is the most effective way to meet this goal?

Options:

A.

Look at current attacks to see if the software that is running is vulnerable to potential ransomware attacks.

B.

Turn on the performs ransomware-like behavior rule in the policies.

C.

Recognize that analytics will automatically block the attacks that may occur.

D.

Start in the monitored policy until it is clear that no attacks are happening.

Buy Now
Question # 10

An administrator is reviewing how event data is categorized and identified in VMware Carbon Black Cloud.

Which method is used?

Options:

A.

By Unique Process ID

B.

By Process Name

C.

By Unique Event ID

D.

By Event Name

Buy Now
Question # 11

An administrator has just placed an endpoint into bypass.

What type of protection, if any, will VMware Carbon Black provide this device?

Options:

A.

VMware Carbon Black will be uninstalled from the endpoint.

B.

VMware Carbon Black will place the machine in quarantine.

C.

VMware Carbon Black will not provide any protection to the endpoint.

D.

VMware Carbon Black will apply policy rules.

Buy Now
Question # 12

An administrator needs to fully analyze the relevant information of an event stored in the VMware Carbon Black Cloud.

On which page can this information be found?

Options:

A.

Enforce

B.

Investigate

C.

Live Query

D.

Inventory

Buy Now
Question # 13

A security administrator notices an unusual software behavior on an endpoint. The administrator immediately used the search query to collect data and start analyzing indicators to find the solution.

What is a pre-requisite step in gathering specific vulnerability data to export it as a CSV file for analysis?

Options:

A.

Perform a custom search on the Endpoint Page.

B.

Access the Audit Log content to see associated events.

C.

Search for specific malware byhash or filename.

D.

Enable cloud analysis.

Buy Now
Exam Code: 5V0-93.22
Exam Name: VMware Carbon Black Cloud Endpoint Standard Skills
Last Update: Jan 31, 2025
Questions: 60
5V0-93.22 pdf

5V0-93.22 PDF

$25.5  $84.99
5V0-93.22 Engine

5V0-93.22 Testing Engine

$28.5  $94.99
5V0-93.22 PDF + Engine

5V0-93.22 PDF + Testing Engine

$40.5  $134.99