Pass the VMware VMware Carbon Black Cloud Endpoint Standard Skills 2023 5V0-93.22 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

An organization has found application.exe running on some machines in their Workstations policy. Application.exe has a SUSPECT_MALWARE reputation and runs from C:\Program Files\IT\Tools. The Workstations policy has the following rules which could apply:

Blocking and Isolation Rule

Question # 11Application on the company banned list > Runs or is running > Deny

Question # 11Known malware > Runs or is running > Deny

Question # 11Suspect malware > Runs or is running > Terminate

Permissions Rule

Question # 11C:\Program Files\IT\Tools\* > Performs any operation > Bypass

Which action, if any, should an administrator take to ensure application.exe cannot run?

Options:

A.

Change the reputation to KNOWN MALWARE to a higher priority.


B.

No action needs to be taken as the file will be blocked based on reputation alone.


C.

Remove the Permissions rule for C:\Program FilesMTVToolsV.


D.

Add the hash to the company banned list at a higher priority.


Questions # 12:

A security administrator needs to remediate a security vulnerability that may affect the sensors. The administrator decides to use a tool that can provide interaction and remote access for further investigation.

Which tool is being used by the administrator?

Options:

A.

CBLauncher


B.

Live Response


C.

PowerCLI


D.

IRepCLI


Questions # 13:

A security administrator is tasked to investigate an alert about a suspicious running process trying to modify a system registry.

Which components can be checked to further inspect the cause of the alert?

Options:

A.

Command lines. Device ID, and priority score


B.

Event details, command lines, and TTPs involved


C.

TTPs involved, network connections, and child path


D.

Priority score, file reputation, and timestamp


Questions # 14:

Which statement accurately characterizes Alerts that are categorized as a "Threat" versus those categorized as "Observed"?

Options:

A.

"Threat" indicates an ongoing attack. "Observed" indicates the attack is over and is being watched.


B.

"Threat" indicates a more likely malicious event. "Observed" are less likely to be malicious.


C.

"Threat" indicates a block (Deny or Terminate) has occurred. "Observed" indicates that there is no block.


D.

"Threat" indicates that no block (Deny or Terminate) has occurred. "Observed" indicates a block.


Questions # 15:

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

Options:

A.

The reputation is determined by cloud reputation.


B.

The sensor prompts the end user to allow or deny the file.


C.

The sensor automatically blocks the new file.


D.

The sensor is unable to block a malicious file.


Questions # 16:

The administrator has configured a permission rule with the following options selected:

Application at path: C:\Users\*\Downloads\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path for this rule?

Options:

A.

Any executable in the downloads directory for any user on the system will be logged and allowed to execute.


B.

No files will be ignored from the downloads directory.


C.

Any executable in the downloads directory for any user on the system will be bypassed for inspection.


D.

Any executable in the downloads directory will be prevented from executing.


Questions # 17:

An administrator has just placed an endpoint into bypass.

What type of protection, if any, will VMware Carbon Black provide this device?

Options:

A.

VMware Carbon Black will be uninstalled from the endpoint.


B.

VMware Carbon Black will place the machine in quarantine.


C.

VMware Carbon Black will not provide any protection to the endpoint.


D.

VMware Carbon Black will apply policy rules.


Questions # 18:

An administrator is working in a development environment that has a policy rule applied and notices that there are too many blocks. The administrator takes action on the policy rule to troubleshoot the issue until the blocks are fixed.

Which action should the administrator take?

Options:

A.

Unenforce


B.

Disable


C.

Recall


D.

Delete


Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions