Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

5V0-93.22 Sample Questions Answers

Questions 4

An administrator needs to configure a policy for macOS and Linux Sensors, not enabling settings which are only applicable to Windows.

Which three settings are only applicable to Sensors on the Windows operating system? (Choose three.)

Options:

A.

Delay execute for cloud scan

B.

Allow user to disable protection

C.

Submit unknown binaries for analysis

D.

Expedited background scan

E.

Scan execute on network drives

F Require code to uninstall sensor

Buy Now
Questions 5

An administrator has dismissed a group of alerts and ticked the box for "Dismiss future instances of this alert on all devices in all policies". There is also a Notification configured to email the administrator whenever an alert of the same Severity occurs. The following day, a new alert is added to the same group of alerts.

How will this alert be handled?

Options:

A.

The alert will show when the Dismissed filter is selected on the Alerts page, and a Notification email will be sent.

B.

The alert will show when the Dismissed filter is selected on Alerts page, but a Notification email will not be sent.

C.

The alert will show when the Not Dismissed filter is selected on Alerts page, and a Notification email will be sent.

D.

The alert will show when Not Dismissed filter is selected on Alerts page, but a Notification email will not be sent.

Buy Now
Questions 6

Which statement accurately characterizes Alerts that are categorized as a "Threat" versus those categorized as "Observed"?

Options:

A.

"Threat" indicates an ongoing attack. "Observed" indicates the attack is over and is being watched.

B.

"Threat" indicates a more likely malicious event. "Observed" are less likely to be malicious.

C.

"Threat" indicates a block (Deny or Terminate) has occurred. "Observed" indicates that there is no block.

D.

"Threat" indicates that no block (Deny or Terminate) has occurred. "Observed" indicates a block.

Buy Now
Questions 7

An administrator needs to create a search, but it must exclude "system.exe".

How should this task be completed?

Options:

A.

#process_name:system.exe

B.

*process_name:system.exe

C.

D.

-process_name:system.exe

Buy Now
Questions 8

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

Options:

A.

A flexible query scheduler that can be used to gather information about the environment

B.

Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems

C.

Customizable threat feeds that plug into a single agent and single console

D.

Policy rules that can be tested by selecting test rule next to the desired operation attempt

Buy Now
Questions 9

An administrator needs to add an application to the Approved List in the VMware Carbon Black Cloud console.

Which two different methods may be used for this purpose? (Choose two.)

Options:

A.

MD5 Hash

B.

Signing Certificate

C.

Application Path

D.

Application Name

E.

IT Tool

Buy Now
Questions 10

A user downloaded and executed malware on a system. The malware is actively exfiltrating data.

Which immediate action is recommended to prevent further exfiltration?

Options:

A.

Check Security Advisories and Threat Research contents.

B.

Place the device in quarantine.

C.

Run a background scan.

D.

Request upload of the file for analysis.

Buy Now
Questions 11

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the application at path field?

Options:

A.

Executable files in the "Program Files" directory and subdirectories will be ignored.

B.

Executable files in the "Program Files" directory will be blocked.

C.

Executable files in the "Program Files" directory will be logged.

D.

Executable files in the "Program Files" directory will be subject to blocking rules.

Buy Now
Questions 12

The VMware Carbon Black Cloud Sensor is not able to establish connectivity to the VMware Carbon Black Cloud Content Management URL over the standard SSL port TCP/443.

Which port, if any, will be the tailback?

Options:

A.

TCP/54443

B.

TCP/80

C.

TCP/8443

D.

It will not fallback and fail.

Buy Now
Questions 13

Where can a user identify whether a sensor's signature pack is out-of-date in VMware Carbon Black Cloud?

Options:

A.

Enforce > Investigate > Sensors > Details

B.

Enforce > Inventory > Endpoints > Policy

C.

Inventory > Endpoints > Sensor Update Status

D.

Inventory > Endpoints > Device Name

Buy Now
Questions 14

Which port does the VMware Carbon Black sensor use to communicate to VMware Carbon Black Cloud?

Options:

A.

443

B.

80

C.

8443

D.

22

Buy Now
Questions 15

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

Options:

A.

The reputation is determined by cloud reputation.

B.

The sensor prompts the end user to allow or deny the file.

C.

The sensor automatically blocks the new file.

D.

The sensor is unable to block a malicious file.

Buy Now
Questions 16

A security administrator needs to remediate a security vulnerability that may affect the sensors. The administrator decides to use a tool that can provide interaction and remote access for further investigation.

Which tool is being used by the administrator?

Options:

A.

CBLauncher

B.

Live Response

C.

PowerCLI

D.

IRepCLI

Buy Now
Questions 17

An administrator needs to use an ID to search and investigate security incidents in Carbon Black Cloud.

Which three IDs may be used for this purpose? (Choose three.)

Options:

A.

Threat

B.

Hash

C.

Sensor

D.

Event

E.

User

F.

Alert

Buy Now
Questions 18

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Users\*\Downloads\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path for this rule?

Options:

A.

Any executable in the downloads directory for any user on the system will be logged and allowed to execute.

B.

No files will be ignored from the downloads directory.

C.

Any executable in the downloads directory for any user on the system will be bypassed for inspection.

D.

Any executable in the downloads directory will be prevented from executing.

Buy Now
Exam Code: 5V0-93.22
Exam Name: VMware Carbon Black Cloud Endpoint Standard Skills
Last Update: Dec 2, 2024
Questions: 60
$66  $164.99
$50  $124.99
$42  $104.99
buy now 5V0-93.22