VMware 5V0-93.22 Practice Test - Questions Answers, Page 3
List of questions
Related questions
A user downloaded and executed malware on a system. The malware is actively exfiltrating data.
Which immediate action is recommended to prevent further exfiltration?
What are the highest and lowest file reputation priorities, respectively, in VMware Carbon Black Cloud?
An administrator wants to find information about real-world prevention rules that can be used in VMware Carbon Black Cloud Endpoint Standard.
How can the administrator obtain this information?
Is it possible to search for unsigned files in the console?
The administrator has configured a permission rule with the following options selected:
Application at path: C:\Program Files\**
Operation Attempt: Performs any operation
Action: Bypass
What is the impact, if any, of using the wildcards in the application at path field?
A script-based attack has been identified that inflicted damage to the corporate systems. The security administrator found out that the malware was coded into Excel VBA and would like to perform a search to further inspect the incident.
Where in the VMware Carbon Black Cloud Endpoint Standard console can this action be completed?
An administrator would like to proactively know that something may get blocked when putting a policy rule in the environment.
How can this information be obtained?
An administrator has just placed an endpoint into bypass.
What type of protection, if any, will VMware Carbon Black provide this device?
A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.
Where can the administrator view this information in the console?
Which statement accurately characterizes Alerts that are categorized as a 'Threat' versus those categorized as 'Observed'?
Question