Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

VMware 5V0-93.22 VMware Carbon Black Cloud Endpoint Standard Skills Exam Practice Test

Demo: 18 questions
Total 60 questions

VMware Carbon Black Cloud Endpoint Standard Skills Questions and Answers

Question 1

What connectivity is required for VMware Carbon Black Cloud Endpoint Standard to perform Sensor Certificate Validation?

Options:

A.

TCP/443 to GoDaddy OCSP and CRL URLs (crl.godaddy.com and ocsp.godaddy.com)

B.

TCP/80 to GoDaddy OCSP and CRL URLs (crl.godaddy.com and ocsp.godaddy.com)

C.

TCP/443 to GoDaddy CRL URL (crl.godaddy.com and ocsp.godaddy.com)

D.

TCP/80 to GoDaddy CRL URL (crl.godaddy.com and ocsp.godaddy.com)

Question 2

An administrator has been tasked with preventing the use of unauthorized USB storage devices from being used in the environment.

Which item needs to be enabled in order to enforce this requirement?

Options:

A.

Enable the Block access to all unapproved USB devices within the policies option.

B.

Choose to disable USB device access on each endpoint from the Inventory page.

C.

Select the option to block USB devices from the Reputation page.

D.

Elect to approve only allowed USB devices from the USB Devices page.

Question 3

An organization has the following requirements for allowing application.exe:

Must not work for any user's D:\ drive

Must allow running only from inside of the user's Temp\Allowed directory

Must not allow running from anywhere outside of Temp\Allowed

For example, on one user's machine, the path is C:\Users\Lorie\Temp\Allowed\application.exe.

Which path meets this criteria using wildcards?

Options:

A.

C:\Users\?\Temp\Allowed\application.exe

B.

C:\Users\*\Temp\Allowed\application.exe

C.

*:\Users\**\Temp\Allowed\application.exe

D.

*:\Users\*\Temp\Allowed\application.exe

Question 4

An administrator is investigating an alert and reads a summary that says:

The application powershell.exe was leveraged to make a potentially malicious network connection.

Which action should the administrator take immediately to block that connection?

Options:

A.

Click Delete Application

B.

Click Quarantine Asset

C.

Click Export Alert

D.

Click Drop Connection

Question 5

Where can a user identify whether a sensor's signature pack is out-of-date in VMware Carbon Black Cloud?

Options:

A.

Enforce > Investigate > Sensors > Details

B.

Enforce > Inventory > Endpoints > Policy

C.

Inventory > Endpoints > Sensor Update Status

D.

Inventory > Endpoints > Device Name

Question 6

An administrator needs to add an application to the Approved List in the VMware Carbon Black Cloud console.

Which two different methods may be used for this purpose? (Choose two.)

Options:

A.

MD5 Hash

B.

Signing Certificate

C.

Application Path

D.

Application Name

E.

IT Tool

Question 7

Which VMware Carbon Black Cloud process is responsible for uploading event reporting to VMware Carbon Black Cloud?

Options:

A.

Sensor Service (RepUx

B.

Scanner Service (scanhost)

C.

Scanner Service (Re

D.

Sensor Service (RepMqr

Question 8

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the application at path field?

Options:

A.

Executable files in the "Program Files" directory and subdirectories will be ignored.

B.

Executable files in the "Program Files" directory will be blocked.

C.

Executable files in the "Program Files" directory will be logged.

D.

Executable files in the "Program Files" directory will be subject to blocking rules.

Question 9

The use of leading wildcards in a query is not recommended unless absolutely necessary because they carry a significant performance penalty for the search.

What is an example of a leading wildcard?

Options:

A.

filemod:system32/ntdll.dll

B.

filemod:system32/*ntdll.dll

C.

filemod:*/system32/ntdll.dll

D.

filemod:system32/ntdll.dll*

Question 10

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

Options:

A.

All executable files in the "Program Files" folder and subfolders will be ignored, includingmalware files.

B.

No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.

C.

Executable files in the "Program Files" folder will be blocked.

D.

Only executable files in the "Program Files" folder will be ignored, includingmalware files.

Question 11

Which scenario would qualify for the "Local White" Reputation?

Options:

A.

The file was added as an IT took

B.

The file was signed using a trusted certificate.

C.

The hash was not on any known good or known bad lists, AND the file is signed.

D.

The hash was previously analyzed, AND it is not on any known good or bad lists.

Question 12

A VMware Carbon Black managed endpoint is showing up as an inactive device in the console.

What is the threshold, in days, before a machine shows as inactive?

Options:

A.

7 days

B.

90 days

C.

60 days

D.

30 days

Question 13

A security administrator notices an unusual software behavior on an endpoint. The administrator immediately used the search query to collect data and start analyzing indicators to find the solution.

What is a pre-requisite step in gathering specific vulnerability data to export it as a CSV file for analysis?

Options:

A.

Perform a custom search on the Endpoint Page.

B.

Access the Audit Log content to see associated events.

C.

Search for specific malware byhash or filename.

D.

Enable cloud analysis.

Question 14

An administrator wants to be notified when particular Tactics, Techniques, or Procedures (TTPs) are observed on a managed endpoint.

Which notification option must the administrator configure to receive this notification?

Options:

A.

Alert that crosses a threshold with the "observed" option selected

B.

Alert that includes specific TTPs

C.

Alert for a Watchlist hit

D.

Policy action that is enforced with the "deny" opt ion selected

Question 15

An organization has found application.exe running on some machines in their Workstations policy. Application.exe has a SUSPECT_MALWARE reputation and runs from C:\Program Files\IT\Tools. The Workstations policy has the following rules which could apply:

Blocking and Isolation Rule

Application on the company banned list > Runs or is running > Deny

Known malware > Runs or is running > Deny

Suspect malware > Runs or is running > Terminate

Permissions Rule

C:\Program Files\IT\Tools\* > Performs any operation > Bypass

Which action, if any, should an administrator take to ensure application.exe cannot run?

Options:

A.

Change the reputation to KNOWN MALWARE to a higher priority.

B.

No action needs to be taken as the file will be blocked based on reputation alone.

C.

Remove the Permissions rule for C:\Program FilesMTVToolsV.

D.

Add the hash to the company banned list at a higher priority.

Question 16

A script-based attack has been identified that inflicted damage to the corporate systems. The security administrator found out that the malware was coded into Excel VBA and would like to perform a search to further inspect the incident.

Where in the VMware Carbon Black Cloud Endpoint Standard console can this action be completed?

Options:

A.

Endpoints

B.

Settings

C.

Investigate

D.

Alerts

Question 17

A security administrator is tasked to investigate an alert about a suspicious running process trying to modify a system registry.

Which components can be checked to further inspect the cause of the alert?

Options:

A.

Command lines. Device ID, and priority score

B.

Event details, command lines, and TTPs involved

C.

TTPs involved, network connections, and child path

D.

Priority score, file reputation, and timestamp

Question 18

An administrator is working in a development environment that has a policy rule applied and notices that there are too many blocks. The administrator takes action on the policy rule to troubleshoot the issue until the blocks are fixed.

Which action should the administrator take?

Options:

A.

Unenforce

B.

Disable

C.

Recall

D.

Delete

Demo: 18 questions
Total 60 questions