Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 18 questions
Exam Code: 5V0-93.22                Update: Oct 15, 2025
Exam Name: VMware Carbon Black Cloud Endpoint Standard Skills

VMware VMware Carbon Black Cloud Endpoint Standard Skills 5V0-93.22 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

A script-based attack has been identified that inflicted damage to the corporate systems. The security administrator found out that the malware was coded into Excel VBA and would like to perform a search to further inspect the incident.

Where in the VMware Carbon Black Cloud Endpoint Standard console can this action be completed?

A.

Endpoints

B.

Settings

C.

Investigate

D.

Alerts

Question # 2

An administrator wants to block an application by its path instead of reputation. The following steps have already been taken:

Go to Enforce > Policies > Select the desired policy >

Which additional steps must be taken to complete the task?

A.

Click Enforce > Add application path name

B.

Scroll down to the Permissions section > Click Add application path > Enter the path of the desired application

C.

Scroll down to the Blocking and Isolation section > Click Edit (pencil icon) for the desired Reputation

D.

Scroll down to the Blocking and Isolation section > Click Add application path > Enter the path of the desired application

Question # 3

A recent application has been blocked using hash ban, which is an indicator that some users attempted an unexpected activity. Even though the activity was blocked, the security administrator wants to further investigate the attempt in VMware Carbon Black Cloud Endpoint Standard.

Which page should the administrator navigate to for a graphical view of the event?

A.

Audit Log

B.

Watchlists

C.

Process Analysis

D.

Alert Triage

Question # 4

An administrator wants to prevent malicious code that has not been seen before from retrieving credentials from the Local Security Authority Subsystem Service, without causing otherwise good applications from being blocked.

Which rule should be used?

A.

[Unknown application] [Retrieves credentials] [Terminate process]

B.

[**/*.exe] [Scrapes memory of another process] [Terminate process]

C.

[**\lsass.exe] [Scrapes memory of another process] [Deny operation]

D.

[Not listed application] [Scrapes memory of another process] [Terminate process]

Question # 5

An organization is seeing a new malicious process that has not been seen before.

Which tool can be used to block this process?

A.

Policy rules

B.

Malware Removal

C.

Certificate banned list

D.

Live Response

Question # 6

In which tab of the VMware Carbon Black Cloud interface can sensor status details be found?

A.

Enforce > Policies

B.

Inventory > Sensors

C.

Inventory > Endpoints

D.

Inventory > Sensor groups

Question # 7

An administrator has configured a permission rule with the following options selected:

Application at path: C:\Program Files\**

Operation Attempt: Performs any operation

Action: Bypass

What is the impact, if any, of using the wildcards in the path?

A.

All executable files in the "Program Files" folder and subfolders will be ignored, includingmalware files.

B.

No Files will be ignored from the "Program Files" director/, but Malware in the "Program Files" directory will continue to be blocked.

C.

Executable files in the "Program Files" folder will be blocked.

D.

Only executable files in the "Program Files" folder will be ignored, includingmalware files.

Question # 8

An administrator needs to configure a policy for macOS and Linux Sensors, not enabling settings which are only applicable to Windows.

Which three settings are only applicable to Sensors on the Windows operating system? (Choose three.)

A.

Delay execute for cloud scan

B.

Allow user to disable protection

C.

Submit unknown binaries for analysis

D.

Expedited background scan

E.

Scan execute on network drives

F Require code to uninstall sensor

Question # 9

A company wants to prevent an executable from running in their organization. The current reputation for the file is NOT LISTED, and the machines are in the default standard policy.

Which action should be taken to prevent the file from executing?

A.

Add the hash to the MALWARE list.

B.

Use Live Response to kill the process.

C.

Use Live Response to delete the file.

D.

Add the hash to the company banned list.

Question # 10

An administrator has just placed an endpoint into bypass.

What type of protection, if any, will VMware Carbon Black provide this device?

A.

VMware Carbon Black will be uninstalled from the endpoint.

B.

VMware Carbon Black will place the machine in quarantine.

C.

VMware Carbon Black will not provide any protection to the endpoint.

D.

VMware Carbon Black will apply policy rules.

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 15 Oct 2025