Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

5V0-93.22 VMware Carbon Black Cloud Endpoint Standard Skills Free Practice Exam Questions (2025 Updated)

Prepare effectively for your VMware 5V0-93.22 VMware Carbon Black Cloud Endpoint Standard Skills certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

An administrator wants to block ransomware in the organization based on leadership's growing concern about ransomware attacks in their industry.

What is the most effective way to meet this goal?

A.

Look at current attacks to see if the software that is running is vulnerable to potential ransomware attacks.

B.

Turn on the performs ransomware-like behavior rule in the policies.

C.

Recognize that analytics will automatically block the attacks that may occur.

D.

Start in the monitored policy until it is clear that no attacks are happening.

An administrator wants to prevent malicious code that has not been seen before from retrieving credentials from the Local Security Authority Subsystem Service, without causing otherwise good applications from being blocked.

Which rule should be used?

A.

[Unknown application] [Retrieves credentials] [Terminate process]

B.

[**/*.exe] [Scrapes memory of another process] [Terminate process]

C.

[**\lsass.exe] [Scrapes memory of another process] [Deny operation]

D.

[Not listed application] [Scrapes memory of another process] [Terminate process]

An administrator needs to find all events on the Investigate page where the process is svchost.exe, and the path is not the standard path of C:\Windows\System32.

Which advanced search will yield these results?

A.

process_name:svchost.exe EXCLUDE process_name:C\:\\Windows\\System32

B.

process_name:svchost.exe AND NOT process_name:C:\Windows\System32

C.

process_name:svchost.exe AND NOT process_name:C\:\\Windows\\System32

D.

process_name:svchost.exe EXCLUDE process_name:C:\Windows\System32

A security administrator needs to remediate a security vulnerability that may affect the sensors. The administrator decides to use a tool that can provide interaction and remote access for further investigation.

Which tool is being used by the administrator?

A.

CBLauncher

B.

Live Response

C.

PowerCLI

D.

IRepCLI

A security administrator needs to review the Live Response activities and commands that have been executed while performing a remediation process to the sensors.

Where can the administrator view this information in the console?

A.

Users

B.

Audit Log

C.

Notifications

D.

Inbox

Which VMware Carbon Black Cloud process is responsible for uploading event reporting to VMware Carbon Black Cloud?

A.

Sensor Service (RepUx

B.

Scanner Service (scanhost)

C.

Scanner Service (Re

D.

Sensor Service (RepMqr

Which VMware Carbon Black Cloud integration is supported for SIEM?

A.

SolarWinds

B.

LogRhythm

C.

Splunk App

D.

Datadog

An administrator wants to block an application by its path instead of reputation. The following steps have already been taken:

Go to Enforce > Policies > Select the desired policy >

Which additional steps must be taken to complete the task?

A.

Click Enforce > Add application path name

B.

Scroll down to the Permissions section > Click Add application path > Enter the path of the desired application

C.

Scroll down to the Blocking and Isolation section > Click Edit (pencil icon) for the desired Reputation

D.

Scroll down to the Blocking and Isolation section > Click Add application path > Enter the path of the desired application

The use of leading wildcards in a query is not recommended unless absolutely necessary because they carry a significant performance penalty for the search.

What is an example of a leading wildcard?

A.

filemod:system32/ntdll.dll

B.

filemod:system32/*ntdll.dll

C.

filemod:*/system32/ntdll.dll

D.

filemod:system32/ntdll.dll*

What are the highest and lowest file reputation priorities, respectively, in VMware Carbon Black Cloud?

A.

Priority 1: Ignore, Priority 11: Unknown

B.

Priority 1: Unknown, Priority 11: Ignore

C.

Priority 1: Known Malware, Priority 11: Common White

D.

Priority 1: Company Allowed, Priority 11: Not Listed/Adaptive White

Which command is used to immediately terminate a current Live Response session?

A.

kill

B.

detach -q

C.

delete

D.

execfg

An administrator is reviewing how event data is categorized and identified in VMware Carbon Black Cloud.

Which method is used?

A.

By Unique Process ID

B.

By Process Name

C.

By Unique Event ID

D.

By Event Name

An administrator is investigating an alert and reads a summary that says:

The application powershell.exe was leveraged to make a potentially malicious network connection.

Which action should the administrator take immediately to block that connection?

A.

Click Delete Application

B.

Click Quarantine Asset

C.

Click Export Alert

D.

Click Drop Connection

A recent application has been blocked using hash ban, which is an indicator that some users attempted an unexpected activity. Even though the activity was blocked, the security administrator wants to further investigate the attempt in VMware Carbon Black Cloud Endpoint Standard.

Which page should the administrator navigate to for a graphical view of the event?

A.

Audit Log

B.

Watchlists

C.

Process Analysis

D.

Alert Triage

A security administrator is tasked to investigate an alert about a suspicious running process trying to modify a system registry.

Which components can be checked to further inspect the cause of the alert?

A.

Command lines. Device ID, and priority score

B.

Event details, command lines, and TTPs involved

C.

TTPs involved, network connections, and child path

D.

Priority score, file reputation, and timestamp

An administrator wants to prevent a spreadsheet from being misused to run malicious code, while minimizing the risk of breaking normal operations of a spreadsheet.

Which rule should be used?

A.

**\Microsoft Office\** [Runs external code] [Terminate process]

B.

**\excel.exe [Invokes a command interpreter] [Deny operation]

C.

**/Microsoft Excel.app/** [Communicates over the network] [Terminate process]

D.

**\excel.exe [Runs malware] [Deny operation]

What is a security benefit of VMware Carbon Black Cloud Endpoint Standard?

A.

A flexible query scheduler that can be used to gather information about the environment

B.

Visibility into the entire attack chain and customizable threat intelligence that can be used to gain insight into problems

C.

Customizable threat feeds that plug into a single agent and single console

D.

Policy rules that can be tested by selecting test rule next to the desired operation attempt

An administrator has configured a terminate rule to prevent an application from running. The administrator wants to confirm that the new rule would have prevented a previous execution that had been observed.

Which feature should the administrator leverage for this purpose?

A.

Setup a notification based on a policy action, and then select Terminate.

B.

Utilize the Test rule link from within the rule.

C.

Configure the rule to terminate the process.

D.

Configure the rule to deny operation of the process.

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved