ExamGecko
Home Home / VMware / 5V0-93.22

VMware 5V0-93.22 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











An administrator is working in a development environment that has a policy rule applied and notices that there are too many blocks. The administrator takes action on the policy rule to troubleshoot the issue until the blocks are fixed.

Which action should the administrator take?

A.
Unenforce
A.
Unenforce
Answers
B.
Disable
B.
Disable
Answers
C.
Recall
C.
Recall
Answers
D.
Delete
D.
Delete
Answers
Suggested answer: B

An organization has the following requirements for allowing application.exe:

For example, on one user's machine, the path is C:\Users\Lorie\Temp\Allowed\application.exe.

Which path meets this criteria using wildcards?

A.
C:\Users\?\Temp\Allowed\application.exe
A.
C:\Users\?\Temp\Allowed\application.exe
Answers
B.
C:\Users\*\Temp\Allowed\application.exe
B.
C:\Users\*\Temp\Allowed\application.exe
Answers
C.
*:\Users\**\Temp\Allowed\application.exe
C.
*:\Users\**\Temp\Allowed\application.exe
Answers
D.
*:\Users\*\Temp\Allowed\application.exe
D.
*:\Users\*\Temp\Allowed\application.exe
Answers
Suggested answer: B

The use of leading wildcards in a query is not recommended unless absolutely necessary because they carry a significant performance penalty for the search.

What is an example of a leading wildcard?

A.
filemod:system32/ntdll.dll
A.
filemod:system32/ntdll.dll
Answers
B.
filemod:system32/*ntdll.dll
B.
filemod:system32/*ntdll.dll
Answers
C.
filemod:*/system32/ntdll.dll
C.
filemod:*/system32/ntdll.dll
Answers
D.
filemod:system32/ntdll.dll*
D.
filemod:system32/ntdll.dll*
Answers
Suggested answer: C

Where can a user identify whether a sensor's signature pack is out-of-date in VMware Carbon Black Cloud?

A.
Enforce > Investigate > Sensors > Details
A.
Enforce > Investigate > Sensors > Details
Answers
B.
Enforce > Inventory > Endpoints > Policy
B.
Enforce > Inventory > Endpoints > Policy
Answers
C.
Inventory > Endpoints > Sensor Update Status
C.
Inventory > Endpoints > Sensor Update Status
Answers
D.
Inventory > Endpoints > Device Name
D.
Inventory > Endpoints > Device Name
Answers
Suggested answer: C

A security administrator is tasked to investigate an alert about a suspicious running process trying to modify a system registry.

Which components can be checked to further inspect the cause of the alert?

A.
Command lines. Device ID, and priority score
A.
Command lines. Device ID, and priority score
Answers
B.
Event details, command lines, and TTPs involved
B.
Event details, command lines, and TTPs involved
Answers
C.
TTPs involved, network connections, and child path
C.
TTPs involved, network connections, and child path
Answers
D.
Priority score, file reputation, and timestamp
D.
Priority score, file reputation, and timestamp
Answers
Suggested answer: B

An administrator wants to be notified when particular Tactics, Techniques, or Procedures (TTPs) are observed on a managed endpoint.

Which notification option must the administrator configure to receive this notification?

A.
Alert that crosses a threshold with the 'observed' option selected
A.
Alert that crosses a threshold with the 'observed' option selected
Answers
B.
Alert that includes specific TTPs
B.
Alert that includes specific TTPs
Answers
C.
Alert for a Watchlist hit
C.
Alert for a Watchlist hit
Answers
D.
Policy action that is enforced with the 'deny' opt ion selected
D.
Policy action that is enforced with the 'deny' opt ion selected
Answers
Suggested answer: C

An administrator needs to configure a policy for macOS and Linux Sensors, not enabling settings which are only applicable to Windows.

Which three settings are only applicable to Sensors on the Windows operating system? (Choose three.)

A.
Delay execute for cloud scan
A.
Delay execute for cloud scan
Answers
B.
Allow user to disable protection
B.
Allow user to disable protection
Answers
C.
Submit unknown binaries for analysis
C.
Submit unknown binaries for analysis
Answers
D.
Expedited background scan
D.
Expedited background scan
Answers
E.
Scan execute on network drives
E.
Scan execute on network drives
Answers
F.
Require code to uninstall sensor
F.
Require code to uninstall sensor
Answers
Suggested answer: A, E, F

An administrator has configured a terminate rule to prevent an application from running. The administrator wants to confirm that the new rule would have prevented a previous execution that had been observed.

Which feature should the administrator leverage for this purpose?

A.
Setup a notification based on a policy action, and then select Terminate.
A.
Setup a notification based on a policy action, and then select Terminate.
Answers
B.
Utilize the Test rule link from within the rule.
B.
Utilize the Test rule link from within the rule.
Answers
C.
Configure the rule to terminate the process.
C.
Configure the rule to terminate the process.
Answers
D.
Configure the rule to deny operation of the process.
D.
Configure the rule to deny operation of the process.
Answers
Suggested answer: B

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

A.
Events and alerts are tagged with Carbon Black TTPs to provide context around attacks.
A.
Events and alerts are tagged with Carbon Black TTPs to provide context around attacks.
Answers
B.
Firewall rule configuration are provided in the environment.
B.
Firewall rule configuration are provided in the environment.
Answers
C.
Data leakage protection (DLP) is enforced on endpoints or subsets of endpoints.
C.
Data leakage protection (DLP) is enforced on endpoints or subsets of endpoints.
Answers
D.
Customized threat feeds can be combined with other outside threat intelligence sources.
D.
Customized threat feeds can be combined with other outside threat intelligence sources.
Answers
Suggested answer: A

A recent application has been blocked using hash ban, which is an indicator that some users attempted an unexpected activity. Even though the activity was blocked, the security administrator wants to further investigate the attempt in VMware Carbon Black Cloud Endpoint Standard.

Which page should the administrator navigate to for a graphical view of the event?

A.
Audit Log
A.
Audit Log
Answers
B.
Watchlists
B.
Watchlists
Answers
C.
Process Analysis
C.
Process Analysis
Answers
D.
Alert Triage
D.
Alert Triage
Answers
Suggested answer: C
Total 60 questions
Go to page: of 6