Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the VMware Carbon Black Cloud Endpoint Standard Skills 2023 5V0-93.22 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 5V0-93.22 Premium Access

View all detail and faqs for the 5V0-93.22 exam


459 Students Passed

90% Average Score

95% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

Options:

A.

The reputation is determined by cloud reputation.

B.

The sensor prompts the end user to allow or deny the file.

C.

The sensor automatically blocks the new file.

D.

The sensor is unable to block a malicious file.

Questions # 2:

An administrator wants to prevent a spreadsheet from being misused to run malicious code, while minimizing the risk of breaking normal operations of a spreadsheet.

Which rule should be used?

Options:

A.

**\Microsoft Office\** [Runs external code] [Terminate process]

B.

**\excel.exe [Invokes a command interpreter] [Deny operation]

C.

**/Microsoft Excel.app/** [Communicates over the network] [Terminate process]

D.

**\excel.exe [Runs malware] [Deny operation]

Questions # 3:

Which VMware Carbon Black Cloud integration is supported for SIEM?

Options:

A.

SolarWinds

B.

LogRhythm

C.

Splunk App

D.

Datadog

Questions # 4:

An administrator is investigating an alert and reads a summary that says:

The application powershell.exe was leveraged to make a potentially malicious network connection.

Which action should the administrator take immediately to block that connection?

Options:

A.

Click Delete Application

B.

Click Quarantine Asset

C.

Click Export Alert

D.

Click Drop Connection

Questions # 5:

An administrator has determined that the following rule was the cause for an unexpected block:

[Suspected malware] [Invokes a command interpreter] [Terminate process]

All reputations for the process which was blocked show SUSPECT_MALWARE.

Which reputation was used by the sensor for the decision to terminate the process?

Options:

A.

Initial Cloud reputation

B.

Actioned reputation

C.

Current Cloud reputation

D.

Effective reputation

Questions # 6:

A recent application has been blocked using hash ban, which is an indicator that some users attempted an unexpected activity. Even though the activity was blocked, the security administrator wants to further investigate the attempt in VMware Carbon Black Cloud Endpoint Standard.

Which page should the administrator navigate to for a graphical view of the event?

Options:

A.

Audit Log

B.

Watchlists

C.

Process Analysis

D.

Alert Triage

Questions # 7:

An administrator needs to find all events on the Investigate page where the process is svchost.exe, and the path is not the standard path of C:\Windows\System32.

Which advanced search will yield these results?

Options:

A.

process_name:svchost.exe EXCLUDE process_name:C\:\\Windows\\System32

B.

process_name:svchost.exe AND NOT process_name:C:\Windows\System32

C.

process_name:svchost.exe AND NOT process_name:C\:\\Windows\\System32

D.

process_name:svchost.exe EXCLUDE process_name:C:\Windows\System32

Questions # 8:

An administrator needs to use an ID to search and investigate security incidents in Carbon Black Cloud.

Which three IDs may be used for this purpose? (Choose three.)

Options:

A.

Threat

B.

Hash

C.

Sensor

D.

Event

E.

User

F.

Alert

Questions # 9:

A script-based attack has been identified that inflicted damage to the corporate systems. The security administrator found out that the malware was coded into Excel VBA and would like to perform a search to further inspect the incident.

Where in the VMware Carbon Black Cloud Endpoint Standard console can this action be completed?

Options:

A.

Endpoints

B.

Settings

C.

Investigate

D.

Alerts

Questions # 10:

An administrator needs to add an application to the Approved List in the VMware Carbon Black Cloud console.

Which two different methods may be used for this purpose? (Choose two.)

Options:

A.

MD5 Hash

B.

Signing Certificate

C.

Application Path

D.

Application Name

E.

IT Tool

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.