Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

VMware 5V0-93.22 VMware Carbon Black Cloud Endpoint Standard Skills Exam Practice Test

Page: 1 / 6
Total 60 questions

VMware Carbon Black Cloud Endpoint Standard Skills Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Is it possible to search for unsigned files in the console?

Options:

A.

Yes, by using the search:

NOT process_publisher_state:FILE_SIGNATURE_STATE_SIGNED

B.

No, it is not possible to return a query for unsigned files.

C.

Yes, by using the search:

process_publisher_state:FILE_SIGNATURE_STATE_UNSIGNED

D.

Yes, by looking at signed and unsigned executables in the environment and seeing if another difference can be found, thus locating unsigned files in the environment.

Question 2

Which permission level is required when a user wants to install a sensor on a Windows endpoint?

Options:

A.

Everyone

B.

Administrator

C.

Root

D.

User

Question 3

An organization has found application.exe running on some machines in their Workstations policy. Application.exe has a SUSPECT_MALWARE reputation and runs from C:\Program Files\IT\Tools. The Workstations policy has the following rules which could apply:

Blocking and Isolation Rule

Application on the company banned list > Runs or is running > Deny

Known malware > Runs or is running > Deny

Suspect malware > Runs or is running > Terminate

Permissions Rule

C:\Program Files\IT\Tools\* > Performs any operation > Bypass

Which action, if any, should an administrator take to ensure application.exe cannot run?

Options:

A.

Change the reputation to KNOWN MALWARE to a higher priority.

B.

No action needs to be taken as the file will be blocked based on reputation alone.

C.

Remove the Permissions rule for C:\Program FilesMTVToolsV.

D.

Add the hash to the company banned list at a higher priority.

Question 4

An administrator wants to block an application by its path instead of reputation. The following steps have already been taken:

Go to Enforce > Policies > Select the desired policy >

Which additional steps must be taken to complete the task?

Options:

A.

Click Enforce > Add application path name

B.

Scroll down to the Permissions section > Click Add application path > Enter the path of the desired application

C.

Scroll down to the Blocking and Isolation section > Click Edit (pencil icon) for the desired Reputation

D.

Scroll down to the Blocking and Isolation section > Click Add application path > Enter the path of the desired application

Question 5

An administrator wants to prevent a spreadsheet from being misused to run malicious code, while minimizing the risk of breaking normal operations of a spreadsheet.

Which rule should be used?

Options:

A.

**\Microsoft Office\** [Runs external code] [Terminate process]

B.

**\excel.exe [Invokes a command interpreter] [Deny operation]

C.

**/Microsoft Excel.app/** [Communicates over the network] [Terminate process]

D.

**\excel.exe [Runs malware] [Deny operation]

Question 6

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

Options:

A.

A flexible query scheduler that can be used to gather information about the environment

B.

Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems

C.

Customizable threat feeds that plug into a single agent and single console

D.

Policy rules that can be tested by selecting test rule next to the desired operation attempt

Question 7

Which scenario would qualify for the "Local White" Reputation?

Options:

A.

The file was added as an IT took

B.

The file was signed using a trusted certificate.

C.

The hash was not on any known good or known bad lists, AND the file is signed.

D.

The hash was previously analyzed, AND it is not on any known good or bad lists.

Question 8

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

Options:

A.

Users

B.

Audit Log

C.

Notifications

D.

Inbox

Question 9

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Users\*\Downloads\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path for this rule?

Options:

A.

Any executable in the downloads directory for any user on the system will be logged and allowed to execute.

B.

No files will be ignored from the downloads directory.

C.

Any executable in the downloads directory for any user on the system will be bypassed for inspection.

D.

Any executable in the downloads directory will be prevented from executing.

Question 10

An administrator is tasked to create a reputation override for a company-critical application based on the highest available priority in the reputation list. The company-critical application is already known by VMware Carbon Black.

Which method of reputation override must the administrator use?

Options:

A.

Signing Certificate

B.

Hash

C.

Local Approved

D.

IT Tool

Question 11

Which statement accurately characterizes Alerts that are categorized as a "Threat" versus those categorized as "Observed"?

Options:

A.

"Threat" indicates an ongoing attack. "Observed" indicates the attack is over and is being watched.

B.

"Threat" indicates a more likely malicious event. "Observed" are less likely to be malicious.

C.

"Threat" indicates a block (Deny or Terminate) has occurred. "Observed" indicates that there is no block.

D.

"Threat" indicates that no block (Deny or Terminate) has occurred. "Observed" indicates a block.

Question 12

What is a capability of VMware Carbon Black Cloud?

Options:

A.

Continuous and decentralized recording

B.

Attack chain visualization and search

C.

Real-time view of attackers

D.

Automation via closed SOAP APIs

Question 13

An administrator has configured a terminate rule to prevent an application from running. The administrator wants to confirm that the new rule would have prevented a previous execution that had been observed.

Which feature should the administrator leverage for this purpose?

Options:

A.

Setup a notification based on a policy action, and then select Terminate.

B.

Utilize the Test rule link from within the rule.

C.

Configure the rule to terminate the process.

D.

Configure the rule to deny operation of the process.

Question 14

In which tab of the VMware Carbon Black Cloud interface can sensor status details be found?

Options:

A.

Enforce > Policies

B.

Inventory > Sensors

C.

Inventory > Endpoints

D.

Inventory > Sensor groups

Question 15

Which statement is true regarding Blocking/Isolation rules and Permission rules?

Options:

A.

Blocking & Isolation rules are overridden by Upload Rules.

B.

Permission Rules are overridden by Blocking & Isolation rules

C.

Upload Rules are overridden by Blocking & Isolation rules.

D.

D.Blocking & Isolation rules are overridden by Permission Rules

Question 16

An administrator needs to make sure all files are scanned locally upon execution.

Which setting is necessary to complete this task?

Options:

A.

On-Access File Scan Mode must be set to Aggressive.

B.

Signature Update frequency must be set to 2 hours.

C.

Allow Signature Updates must be enabled.

D.

Run Background Scan must be set to Expedited.

Question 17

A script-based attack has been identified that inflicted damage to the corporate systems. The security administrator found out that the malware was coded into Excel VBA and would like to perform a search to further inspect the incident.

Where in the VMware Carbon Black Cloud Endpoint Standard console can this action be completed?

Options:

A.

Endpoints

B.

Settings

C.

Investigate

D.

Alerts

Question 18

An administrator is investigating an alert and reads a summary that says:

The application powershell.exe was leveraged to make a potentially malicious network connection.

Which action should the administrator take immediately to block that connection?

Options:

A.

Click Delete Application

B.

Click Quarantine Asset

C.

Click Export Alert

D.

Click Drop Connection

Page: 1 / 6
Total 60 questions