Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free VMware 5V0-93.22 Practice Exam with Questions & Answers | Set: 2

Questions 11

An administrator needs to add an application to the Approved List in the VMware Carbon Black Cloud console.

Which two different methods may be used for this purpose? (Choose two.)

Options:
A.

MD5 Hash

B.

Signing Certificate

C.

Application Path

D.

Application Name

E.

IT Tool

VMware 5V0-93.22 Premium Access
Questions 12

An administrator has determined that the following rule was the cause for an unexpected block:

[Suspected malware] [Invokes a command interpreter] [Terminate process]

All reputations for the process which was blocked show SUSPECT_MALWARE.

Which reputation was used by the sensor for the decision to terminate the process?

Options:
A.

Initial Cloud reputation

B.

Actioned reputation

C.

Current Cloud reputation

D.

Effective reputation

Questions 13

Which scenario would qualify for the "Local White" Reputation?

Options:
A.

The file was added as an IT took

B.

The file was signed using a trusted certificate.

C.

The hash was not on any known good or known bad lists, AND the file is signed.

D.

The hash was previously analyzed, AND it is not on any known good or bad lists.

Questions 14

An administrator is tasked to create a reputation override for a company-critical application based on the highest available priority in the reputation list. The company-critical application is already known by VMware Carbon Black.

Which method of reputation override must the administrator use?

Options:
A.

Signing Certificate

B.

Hash

C.

Local Approved

D.

IT Tool

Questions 15

An administrator wants to prevent ransomware that has not been seen before, without blocking other processes.

Which rule should be used?

Options:
A.

[Adware or PUP] [Scrapes memory of another process] [Deny operation]

B.

[Not listed application] [Performs ransomware-like behavior] [Terminate process

C.

[Unknown malware] [Runs or is running] [Terminate process]

D.

[Not listed application] [Runs or is running] [Terminate process]

Questions 16

An administrator is reviewing how event data is categorized and identified in VMware Carbon Black Cloud.

Which method is used?

Options:
A.

By Unique Process ID

B.

By Process Name

C.

By Unique Event ID

D.

By Event Name

Questions 17

A security administrator is tasked to enable Live Response on all endpoints in a specific policy.

What is the correct path to configure the required sensor policy setting?

Options:
A.

Enforce > Policy > Policies > Sensor

B.

Policies > Policy > Sensor > Enforce

C.

Policies > Enforce > Policy > Sensor

D.

Enforce > Policies > Policy > Sensor

Questions 18

Which statement accurately characterizes Alerts that are categorized as a "Threat" versus those categorized as "Observed"?

Options:
A.

"Threat" indicates an ongoing attack. "Observed" indicates the attack is over and is being watched.

B.

"Threat" indicates a more likely malicious event. "Observed" are less likely to be malicious.

C.

"Threat" indicates a block (Deny or Terminate) has occurred. "Observed" indicates that there is no block.

D.

"Threat" indicates that no block (Deny or Terminate) has occurred. "Observed" indicates a block.