Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

VMware Carbon Black Cloud Endpoint Standard Skills

Last Update 22 hours ago Total Questions : 60

The VMware Carbon Black Cloud Endpoint Standard Skills content is now fully updated, with all current exam questions added 22 hours ago. Deciding to include 5V0-93.22 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 5V0-93.22 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 5V0-93.22 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any VMware Carbon Black Cloud Endpoint Standard Skills practice test comfortably within the allotted time.

Question # 4

A security administrator is tasked to investigate an alert about a suspicious running process trying to modify a system registry.

Which components can be checked to further inspect the cause of the alert?

A.

Command lines. Device ID, and priority score

B.

Event details, command lines, and TTPs involved

C.

TTPs involved, network connections, and child path

D.

Priority score, file reputation, and timestamp

Question # 5

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Users\*\Downloads\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path for this rule?

A.

Any executable in the downloads directory for any user on the system will be logged and allowed to execute.

B.

No files will be ignored from the downloads directory.

C.

Any executable in the downloads directory for any user on the system will be bypassed for inspection.

D.

Any executable in the downloads directory will be prevented from executing.

Question # 6

A VMware Carbon Black managed endpoint is showing up as an inactive device in the console.

What is the threshold, in days, before a machine shows as inactive?

A.

7 days

B.

90 days

C.

60 days

D.

30 days

Question # 7

Which scenario would qualify for the "Local White" Reputation?

A.

The file was added as an IT took

B.

The file was signed using a trusted certificate.

C.

The hash was not on any known good or known bad lists, AND the file is signed.

D.

The hash was previously analyzed, AND it is not on any known good or bad lists.

Question # 8

An administrator wants to prevent a spreadsheet from being misused to run malicious code, while minimizing the risk of breaking normal operations of a spreadsheet.

Which rule should be used?

A.

**\Microsoft Office\** [Runs external code] [Terminate process]

B.

**\excel.exe [Invokes a command interpreter] [Deny operation]

C.

**/Microsoft Excel.app/** [Communicates over the network] [Terminate process]

D.

**\excel.exe [Runs malware] [Deny operation]

Question # 9

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

A.

Users

B.

Audit Log

C.

Notifications

D.

Inbox

Question # 10

An administrator needs to add an application to the Approved List in the VMware Carbon Black Cloud console.

Which two different methods may be used for this purpose? (Choose two.)

A.

MD5 Hash

B.

Signing Certificate

C.

Application Path

D.

Application Name

E.

IT Tool

Go to page: