ExamGecko
Home Home / VMware / 5V0-93.22

VMware 5V0-93.22 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











An administrator needs to make sure all files are scanned locally upon execution.

Which setting is necessary to complete this task?

A.
On-Access File Scan Mode must be set to Aggressive.
A.
On-Access File Scan Mode must be set to Aggressive.
Answers
B.
Signature Update frequency must be set to 2 hours.
B.
Signature Update frequency must be set to 2 hours.
Answers
C.
Allow Signature Updates must be enabled.
C.
Allow Signature Updates must be enabled.
Answers
D.
Run Background Scan must be set to Expedited.
D.
Run Background Scan must be set to Expedited.
Answers
Suggested answer: A

An organization has found application.exe running on some machines in their Workstations policy. Application.exe has a SUSPECT_MALWARE reputation and runs from C:\Program Files\IT\Tools. The Workstations policy has the following rules which could apply:

Blocking and Isolation Rule

Permissions Rule

Which action, if any, should an administrator take to ensure application.exe cannot run?

A.
Change the reputation to KNOWN MALWARE to a higher priority.
A.
Change the reputation to KNOWN MALWARE to a higher priority.
Answers
B.
No action needs to be taken as the file will be blocked based on reputation alone.
B.
No action needs to be taken as the file will be blocked based on reputation alone.
Answers
C.
Remove the Permissions rule for C:\Program FilesMTVToolsV.
C.
Remove the Permissions rule for C:\Program FilesMTVToolsV.
Answers
D.
Add the hash to the company banned list at a higher priority.
D.
Add the hash to the company banned list at a higher priority.
Answers
Suggested answer: C

An administrator is tasked to create a reputation override for a company-critical application based on the highest available priority in the reputation list. The company-critical application is already known by VMware Carbon Black.

Which method of reputation override must the administrator use?

A.
Signing Certificate
A.
Signing Certificate
Answers
B.
Hash
B.
Hash
Answers
C.
Local Approved
C.
Local Approved
Answers
D.
IT Tool
D.
IT Tool
Answers
Suggested answer: A

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

A.
All executable files in the 'Program Files' folder and subfolders will be ignored, including malware files.
A.
All executable files in the 'Program Files' folder and subfolders will be ignored, including malware files.
Answers
B.
No Files will be ignored from the 'Program Files' director/, but Malware in the 'Program Files' directory will continue to be blocked.
B.
No Files will be ignored from the 'Program Files' director/, but Malware in the 'Program Files' directory will continue to be blocked.
Answers
C.
Executable files in the 'Program Files' folder will be blocked.
C.
Executable files in the 'Program Files' folder will be blocked.
Answers
D.
Only executable files in the 'Program Files' folder will be ignored, including malware files.
D.
Only executable files in the 'Program Files' folder will be ignored, including malware files.
Answers
Suggested answer: A

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

A.
A flexible query scheduler that can be used to gather information about the environment
A.
A flexible query scheduler that can be used to gather information about the environment
Answers
B.
Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems
B.
Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems
Answers
C.
Customizable threat feeds that plug into a single agent and single console
C.
Customizable threat feeds that plug into a single agent and single console
Answers
D.
Policy rules that can be tested by selecting test rule next to the desired operation attempt
D.
Policy rules that can be tested by selecting test rule next to the desired operation attempt
Answers
Suggested answer: B

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

A.
The reputation is determined by cloud reputation.
A.
The reputation is determined by cloud reputation.
Answers
B.
The sensor prompts the end user to allow or deny the file.
B.
The sensor prompts the end user to allow or deny the file.
Answers
C.
The sensor automatically blocks the new file.
C.
The sensor automatically blocks the new file.
Answers
D.
The sensor is unable to block a malicious file.
D.
The sensor is unable to block a malicious file.
Answers
Suggested answer: A

In which tab of the VMware Carbon Black Cloud interface can sensor status details be found?

A.
Enforce > Policies
A.
Enforce > Policies
Answers
B.
Inventory > Sensors
B.
Inventory > Sensors
Answers
C.
Inventory > Endpoints
C.
Inventory > Endpoints
Answers
D.
Inventory > Sensor groups
D.
Inventory > Sensor groups
Answers
Suggested answer: C

An administrator wants to block ransomware in the organization based on leadership's growing concern about ransomware attacks in their industry.

What is the most effective way to meet this goal?

A.
Look at current attacks to see if the software that is running is vulnerable to potential ransomware attacks.
A.
Look at current attacks to see if the software that is running is vulnerable to potential ransomware attacks.
Answers
B.
Turn on the performs ransomware-like behavior rule in the policies.
B.
Turn on the performs ransomware-like behavior rule in the policies.
Answers
C.
Recognize that analytics will automatically block the attacks that may occur.
C.
Recognize that analytics will automatically block the attacks that may occur.
Answers
D.
Start in the monitored policy until it is clear that no attacks are happening.
D.
Start in the monitored policy until it is clear that no attacks are happening.
Answers
Suggested answer: B

Which port does the VMware Carbon Black sensor use to communicate to VMware Carbon Black Cloud?

A.
443
A.
443
Answers
B.
80
B.
80
Answers
C.
8443
C.
8443
Answers
D.
22
D.
22
Answers
Suggested answer: A

A security administrator is tasked to enable Live Response on all endpoints in a specific policy.

What is the correct path to configure the required sensor policy setting?

A.
Enforce > Policy > Policies > Sensor
A.
Enforce > Policy > Policies > Sensor
Answers
B.
Policies > Policy > Sensor > Enforce
B.
Policies > Policy > Sensor > Enforce
Answers
C.
Policies > Enforce > Policy > Sensor
C.
Policies > Enforce > Policy > Sensor
Answers
D.
Enforce > Policies > Policy > Sensor
D.
Enforce > Policies > Policy > Sensor
Answers
Suggested answer: A
Total 60 questions
Go to page: of 6