Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

5V0-93.22 VMware Carbon Black Cloud Endpoint Standard Skills Questions and Answers

Questions 4

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

Options:

A.

A flexible query scheduler that can be used to gather information about the environment

B.

Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems

C.

Customizable threat feeds that plug into a single agent and single console

D.

Policy rules that can be tested by selecting test rule next to the desired operation attempt

Buy Now
Questions 5

An organization has found application.exe running on some machines in their Workstations policy. Application.exe has a SUSPECT_MALWARE reputation and runs from C:\Program Files\IT\Tools. The Workstations policy has the following rules which could apply:

Blocking and Isolation Rule

5V0-93.22 Question 5 Application on the company banned list > Runs or is running > Deny

5V0-93.22 Question 5 Known malware > Runs or is running > Deny

5V0-93.22 Question 5 Suspect malware > Runs or is running > Terminate

Permissions Rule

5V0-93.22 Question 5 C:\Program Files\IT\Tools\* > Performs any operation > Bypass

Which action, if any, should an administrator take to ensure application.exe cannot run?

Options:

A.

Change the reputation to KNOWN MALWARE to a higher priority.

B.

No action needs to be taken as the file will be blocked based on reputation alone.

C.

Remove the Permissions rule for C:\Program FilesMTVToolsV.

D.

Add the hash to the company banned list at a higher priority.

Buy Now
Questions 6

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

Options:

A.

Events and alerts are tagged with Carbon Black TTPs to provide context around attacks.

B.

Firewall rule configuration are provided in the environment.

C.

Data leakage protection (DLP) is enforced on endpoints or subsets of endpoints.

D.

Customized threat feeds can be combined with other outside threat intelligence sources.

Buy Now
Questions 7

An administrator needs to use an ID to search and investigate security incidents in Carbon Black Cloud.

Which three IDs may be used for this purpose? (Choose three.)

Options:

A.

Threat

B.

Hash

C.

Sensor

D.

Event

E.

User

F.

Alert

Buy Now
Questions 8

An administrator wants to be notified when particular Tactics, Techniques, or Procedures (TTPs) are observed on a managed endpoint.

Which notification option must the administrator configure to receive this notification?

Options:

A.

Alert that crosses a threshold with the "observed" option selected

B.

Alert that includes specific TTPs

C.

Alert for a Watchlist hit

D.

Policy action that is enforced with the "deny" opt ion selected

Buy Now
Questions 9

What is a capability of VMware Carbon Black Cloud?

Options:

A.

Continuous and decentralized recording

B.

Attack chain visualization and search

C.

Real-time view of attackers

D.

Automation via closed SOAP APIs

Buy Now
Questions 10

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

Options:

A.

All executable files in the "Program Files" folder and subfolders will be ignored, including malware files.

B.

No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.

C.

Executable files in the "Program Files" folder will be blocked.

D.

Only executable files in the "Program Files" folder will be ignored, including malware files.

Buy Now
Questions 11

Is it possible to search for unsigned files in the console?

Options:

A.

Yes, by using the search:

NOT process_publisher_state:FILE_SIGNATURE_STATE_SIGNED

B.

No, it is not possible to return a query for unsigned files.

C.

Yes, by using the search:

process_publisher_state:FILE_SIGNATURE_STATE_UNSIGNED

D.

Yes, by looking at signed and unsigned executables in the environment and seeing if another difference can be found, thus locating unsigned files in the environment.

Buy Now
Questions 12

An administrator notices that a sensor's local AV signatures are out-of-date.

What effect does this have on newly discovered files?

Options:

A.

The reputation is determined by cloud reputation.

B.

The sensor prompts the end user to allow or deny the file.

C.

The sensor automatically blocks the new file.

D.

The sensor is unable to block a malicious file.

Buy Now
Questions 13

An administrator has configured a terminate rule to prevent an application from running. The administrator wants to confirm that the new rule would have prevented a previous execution that had been observed.

Which feature should the administrator leverage for this purpose?

Options:

A.

Setup a notification based on a policy action, and then select Terminate.

B.

Utilize the Test rule link from within the rule.

C.

Configure the rule to terminate the process.

D.

Configure the rule to deny operation of the process.

Buy Now
Questions 14

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

Options:

A.

Users

B.

Audit Log

C.

Notifications

D.

Inbox

Buy Now
Questions 15

The use of leading wildcards in a query is not recommended unless absolutely necessary because they carry a significant performance penalty for the search.

What is an example of a leading wildcard?

Options:

A.

filemod:system32/ntdll.dll

B.

filemod:system32/*ntdll.dll

C.

filemod:*/system32/ntdll.dll

D.

filemod:system32/ntdll.dll*

Buy Now
Questions 16

An organization is seeing a new malicious process that has not been seen before.

Which tool can be used to block this process?

Options:

A.

Policy rules

B.

Malware Removal

C.

Certificate banned list

D.

Live Response

Buy Now
Questions 17

An administrator is reviewing how event data is categorized and identified in VMware Carbon Black Cloud.

Which method is used?

Options:

A.

By Unique Process ID

B.

By Process Name

C.

By Unique Event ID

D.

By Event Name

Buy Now
Exam Code: 5V0-93.22
Exam Name: VMware Carbon Black Cloud Endpoint Standard Skills
Last Update: May 8, 2026
Questions: 60

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 5V0-93.22 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 5V0-93.22 pdf