Practice Free 5V0-93.22 Exam Online Questions
An administrator wants to find information about real-world prevention rules that can be used in
VMware Carbon Black Cloud Endpoint Standard.
How can the administrator obtain this information?
- A . Refer to an external report from other security vendors to obtain solutions.
- B . Refer to the TAU-TIN’s on the VMware Carbon Black community page.
- C . Refer to the VMware Carbon Black Cloud sensor install guide.
- D . Refer to VMware Carbon Black Cloud user guide.
An administrator has configured a permission rule with the following options selected:
– Application at path: C:Program Files**
– Operation Attempt: Performs any operation
– Action: Bypass
What is the impact, if any, of using the wildcards in the path?
- A . All executable files in the "Program Files" folder and subfolders will be ignored, including malware files.
- B . No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.
- C . Executable files in the "Program Files" folder will be blocked.
- D . Only executable files in the "Program Files" folder will be ignored, including malware files.
The administrator has configured a permission rule with the following options selected:
– Application at path: C:Program Files**
– Operation Attempt: Performs any operation
– Action: Bypass
What is the impact, if any, of using the wildcards in the application at path field?
- A . Executable files in the "Program Files" directory and subdirectories will be ignored.
- B . Executable files in the "Program Files" directory will be blocked.
- C . Executable files in the "Program Files" directory will be logged.
- D . Executable files in the "Program Files" directory will be subject to blocking rules.
An administrator wants to block an application by its path instead of reputation. The following steps have already been taken:
Go to Enforce > Policies > Select the desired policy >
Which additional steps must be taken to complete the task?
- A . Click Enforce > Add application path name
- B . Scroll down to the Permissions section > Click Add application path > Enter the path of the desired application
- C . Scroll down to the Blocking and Isolation section > Click Edit (pencil icon) for the desired Reputation
- D . Scroll down to the Blocking and Isolation section > Click Add application path > Enter the path of the desired application
A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.
Where can the administrator view this information in the console?
- A . Users
- B . Audit Log
- C . Notifications
- D . Inbox
In which tab of the VMware Carbon Black Cloud interface can sensor status details be found?
- A . Enforce > Policies
- B . Inventory > Sensors
- C . Inventory > Endpoints
- D . Inventory > Sensor groups
An organization is seeing a new malicious process that has not been seen before.
Which tool can be used to block this process?
- A . Policy rules
- B . Malware Removal
- C . Certificate banned list
- D . Live Response
An administrator has been tasked with preventing the use of unauthorized USB storage devices from being used in the environment.
Which item needs to be enabled in order to enforce this requirement?
- A . Enable the Block access to all unapproved USB devices within the policies option.
- B . Choose to disable USB device access on each endpoint from the Inventory page.
- C . Select the option to block USB devices from the Reputation page.
- D . Elect to approve only allowed USB devices from the USB Devices page.