Pass the VMware VMware Carbon Black Cloud Endpoint Standard Skills 2023 5V0-93.22 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An administrator needs to add an application to the Approved List in the VMware Carbon Black Cloud console.

Which two different methods may be used for this purpose? (Choose two.)

Options:

A.

MD5 Hash


B.

Signing Certificate


C.

Application Path


D.

Application Name


E.

IT Tool


Questions # 2:

The use of leading wildcards in a query is not recommended unless absolutely necessary because they carry a significant performance penalty for the search.

What is an example of a leading wildcard?

Options:

A.

filemod:system32/ntdll.dll


B.

filemod:system32/*ntdll.dll


C.

filemod:*/system32/ntdll.dll


D.

filemod:system32/ntdll.dll*


Questions # 3:

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

Options:

A.

Users


B.

Audit Log


C.

Notifications


D.

Inbox


Questions # 4:

A user downloaded and executed malware on a system. The malware is actively exfiltrating data.

Which immediate action is recommended to prevent further exfiltration?

Options:

A.

Check Security Advisories and Threat Research contents.


B.

Place the device in quarantine.


C.

Run a background scan.


D.

Request upload of the file for analysis.


Questions # 5:

Is it possible to search for unsigned files in the console?

Options:

A.

Yes, by using the search:

NOT process_publisher_state:FILE_SIGNATURE_STATE_SIGNED


B.

No, it is not possible to return a query for unsigned files.


C.

Yes, by using the search:

process_publisher_state:FILE_SIGNATURE_STATE_UNSIGNED


D.

Yes, by looking at signed and unsigned executables in the environment and seeing if another difference can be found, thus locating unsigned files in the environment.


Questions # 6:

A company wants to prevent an executable from running in their organization. The current reputation for the file is NOT LISTED, and the machines are in the default standard policy.

Which action should be taken to prevent the file from executing?

Options:

A.

Add the hash to the MALWARE list.


B.

Use Live Response to kill the process.


C.

Use Live Response to delete the file.


D.

Add the hash to the company banned list.


Questions # 7:

An administrator wants to prevent malicious code that has not been seen before from retrieving credentials from the Local Security Authority Subsystem Service, without causing otherwise good applications from being blocked.

Which rule should be used?

Options:

A.

[Unknown application] [Retrieves credentials] [Terminate process]


B.

[**/*.exe] [Scrapes memory of another process] [Terminate process]


C.

[**\lsass.exe] [Scrapes memory of another process] [Deny operation]


D.

[Not listed application] [Scrapes memory of another process] [Terminate process]


Questions # 8:

An organization has the following requirements for allowing application.exe:

Question # 8Must not work for any user's D:\ drive

Question # 8Must allow running only from inside of the user's Temp\Allowed directory

Question # 8Must not allow running from anywhere outside of Temp\Allowed

For example, on one user's machine, the path is C:\Users\Lorie\Temp\Allowed\application.exe.

Which path meets this criteria using wildcards?

Options:

A.

C:\Users\?\Temp\Allowed\application.exe


B.

C:\Users\*\Temp\Allowed\application.exe


C.

*:\Users\**\Temp\Allowed\application.exe


D.

*:\Users\*\Temp\Allowed\application.exe


Questions # 9:

Which scenario would qualify for the "Local White" Reputation?

Options:

A.

The file was added as an IT took


B.

The file was signed using a trusted certificate.


C.

The hash was not on any known good or known bad lists, AND the file is signed.


D.

The hash was previously analyzed, AND it is not on any known good or bad lists.


Questions # 10:

A security administrator notices an unusual software behavior on an endpoint. The administrator immediately used the search query to collect data and start analyzing indicators to find the solution.

What is a pre-requisite step in gathering specific vulnerability data to export it as a CSV file for analysis?

Options:

A.

Perform a custom search on the Endpoint Page.


B.

Access the Audit Log content to see associated events.


C.

Search for specific malware byhash or filename.


D.

Enable cloud analysis.


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions