Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free VMware 5V0-93.22 Practice Exam with Questions & Answers

Questions 1

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

Options:
A.

All executable files in the "Program Files" folder and subfolders will be ignored, includingmalware files.

B.

No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.

C.

Executable files in the "Program Files" folder will be blocked.

D.

Only executable files in the "Program Files" folder will be ignored, includingmalware files.

VMware 5V0-93.22 Premium Access
Questions 2

Which command is used to immediately terminate a current Live Response session?

Options:
A.

kill

B.

detach -q

C.

delete

D.

execfg

Questions 3

An administrator needs to find all events on the Investigate page where the process is svchost.exe, and the path is not the standard path of C:\Windows\System32.

Which advanced search will yield these results?

Options:
A.

process_name:svchost.exe EXCLUDE process_name:C\:\\Windows\\System32

B.

process_name:svchost.exe AND NOT process_name:C:\Windows\System32

C.

process_name:svchost.exe AND NOT process_name:C\:\\Windows\\System32

D.

process_name:svchost.exe EXCLUDE process_name:C:\Windows\System32

Questions 4

What connectivity is required for VMware Carbon Black Cloud Endpoint Standard to perform Sensor Certificate Validation?

Options:
A.

TCP/443 to GoDaddy OCSP and CRL URLs (crl.godaddy.com and ocsp.godaddy.com)

B.

TCP/80 to GoDaddy OCSP and CRL URLs (crl.godaddy.com and ocsp.godaddy.com)

C.

TCP/443 to GoDaddy CRL URL (crl.godaddy.com and ocsp.godaddy.com)

D.

TCP/80 to GoDaddy CRL URL (crl.godaddy.com and ocsp.godaddy.com)

Questions 5

An administrator wants to block ransomware in the organization based on leadership's growing concern about ransomware attacks in their industry.

What is the most effective way to meet this goal?

Options:
A.

Look at current attacks to see if the software that is running is vulnerable to potential ransomware attacks.

B.

Turn on the performs ransomware-like behavior rule in the policies.

C.

Recognize that analytics will automatically block the attacks that may occur.

D.

Start in the monitored policy until it is clear that no attacks are happening.

Questions 6

An administrator has dismissed a group of alerts and ticked the box for "Dismiss future instances of this alert on all devices in all policies". There is also a Notification configured to email the administrator whenever an alert of the same Severity occurs. The following day, a new alert is added to the same group of alerts.

How will this alert be handled?

Options:
A.

The alert will show when the Dismissed filter is selected on the Alerts page, and a Notification email will be sent.

B.

The alert will show when the Dismissed filter is selected on Alerts page, but a Notification email will not be sent.

C.

The alert will show when the Not Dismissed filter is selected on Alerts page, and a Notification email will be sent.

D.

The alert will show when Not Dismissed filter is selected on Alerts page, but a Notification email will not be sent.

Questions 7

Which permission level is required when a user wants to install a sensor on a Windows endpoint?

Options:
A.

Everyone

B.

Administrator

C.

Root

D.

User

Questions 8

An administrator wants to be notified when particular Tactics, Techniques, or Procedures (TTPs) are observed on a managed endpoint.

Which notification option must the administrator configure to receive this notification?

Options:
A.

Alert that crosses a threshold with the "observed" option selected

B.

Alert that includes specific TTPs

C.

Alert for a Watchlist hit

D.

Policy action that is enforced with the "deny" opt ion selected

Questions 9

Which port does the VMware Carbon Black sensor use to communicate to VMware Carbon Black Cloud?

Options:
A.

443

B.

80

C.

8443

D.

22

Questions 10

An administrator wants to prevent malicious code that has not been seen before from retrieving credentials from the Local Security Authority Subsystem Service, without causing otherwise good applications from being blocked.

Which rule should be used?

Options:
A.

[Unknown application] [Retrieves credentials] [Terminate process]

B.

[**/*.exe] [Scrapes memory of another process] [Terminate process]

C.

[**\lsass.exe] [Scrapes memory of another process] [Deny operation]

D.

[Not listed application] [Scrapes memory of another process] [Terminate process]