VMware 5V0-93.22 Exam (page: 2)
VMware Carbon Black Cloud Endpoint Standard Skills
Updated on: 12-Feb-2026

Viewing Page 2 of 9

A user downloaded and executed malware on a system. The malware is actively exfiltrating data.

Which immediate action is recommended to prevent further exfiltration?

  1. Check Security Advisories and Threat Research contents.
  2. Place the device in quarantine.
  3. Run a background scan.
  4. Request upload of the file for analysis.

Answer(s): B



What are the highest and lowest file reputation priorities, respectively, in VMware Carbon Black Cloud?

  1. Priority 1: Ignore, Priority 11: Unknown
  2. Priority 1: Unknown, Priority 11: Ignore
  3. Priority 1: Known Malware, Priority 11: Common White
  4. Priority 1: Company Allowed, Priority 11: Not Listed/Adaptive White

Answer(s): A



An administrator wants to find information about real-world prevention rules that can be used in VMware Carbon Black Cloud Endpoint Standard.
How can the administrator obtain this information?

  1. Refer to an external report from other security vendors to obtain solutions.
  2. Refer to the TAU-TIN's on the VMware Carbon Black community page.
  3. Refer to the VMware Carbon Black Cloud sensor install guide.
  4. Refer to VMware Carbon Black Cloud user guide.

Answer(s): B



Is it possible to search for unsigned files in the console?

  1. Yes, by using the search:
    NOT process_publisher_state:FILE_SIGNATURE_STATE_SIGNED
  2. No, it is not possible to return a query for unsigned files.
  3. Yes, by using the search:
    process_publisher_state:FILE_SIGNATURE_STATE_UNSIGNED
  4. Yes, by looking at signed and unsigned executables in the environment and seeing if another difference can be found, thus locating unsigned files in the environment.

Answer(s): C



The administrator has configured a permission rule with the following options selected:
Application at path: C:\Program Files\**
Operation Attempt: Performs any operation
Action: Bypass
What is the impact, if any, of using the wildcards in the application at path field?

  1. Executable files in the "Program Files" directory and subdirectories will be ignored.
  2. Executable files in the "Program Files" directory will be blocked.
  3. Executable files in the "Program Files" directory will be logged.
  4. Executable files in the "Program Files" directory will be subject to blocking rules.

Answer(s): A



A script-based attack has been identified that inflicted damage to the corporate systems. The security administrator found out that the malware was coded into Excel VBA and would like to perform a search to further inspect the incident.
Where in the VMware Carbon Black Cloud Endpoint Standard console can this action be completed?

  1. Endpoints
  2. Settings
  3. Investigate
  4. Alerts

Answer(s): C



An administrator would like to proactively know that something may get blocked when putting a policy rule in the environment.
How can this information be obtained?

  1. Search the data using the test rule functionality.
    B Examine log files to see what would be impacted
  2. Put the rules in and see what happens to the endpoints.
    D Determine what would happen based on previously used antivirus software

Answer(s): A



An administrator has just placed an endpoint into bypass.
What type of protection, if any, will VMware Carbon Black provide this device?

  1. VMware Carbon Black will be uninstalled from the endpoint.
  2. VMware Carbon Black will place the machine in quarantine.
  3. VMware Carbon Black will not provide any protection to the endpoint.
  4. VMware Carbon Black will apply policy rules.

Answer(s): C



Viewing Page 2 of 9



Share your comments for VMware 5V0-93.22 exam with other users:

Ananya 9/14/2023 5:16:00 AM

please make this content available
UNITED STATES


Swathi 6/4/2023 2:18:00 PM

content is good
Anonymous


Leo 7/29/2023 8:45:00 AM

latest dumps please
INDIA


Laolu 2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.
UNITED STATES


Zaynik 9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer
Anonymous


Massam 6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump
Anonymous


Anonymous 12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.
INDIA


Japles 5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.
Anonymous


Faritha 8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures
UNITED STATES


Anonymous 9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i
UNITED STATES


p das 12/7/2023 11:41:00 PM

very good questions
UNITED STATES


Anna 1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?
KOREA REPUBLIC OF


Bhavya 9/13/2023 10:15:00 AM

very usefull
Anonymous


Rahul Kumar 8/31/2023 12:30:00 PM

need certification.
CANADA


Diran Ole 9/17/2023 5:15:00 PM

great exam prep
CANADA


Venkata Subbarao Bandaru 6/24/2023 8:45:00 AM

i require dump
Anonymous


D 7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,
Anonymous


Ann 9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks
AUSTRALIA


Sridhar 1/16/2024 9:19:00 PM

good questions
Anonymous


Summer 10/4/2023 9:57:00 PM

looking forward to the real exam
Anonymous


vv 12/2/2023 2:45:00 PM

good ones for exam preparation
UNITED STATES


Danny Zas 9/15/2023 4:45:00 AM

this is a good experience
UNITED STATES


SM 1211 10/12/2023 10:06:00 PM

hi everyone
UNITED STATES


A 10/2/2023 6:08:00 PM

waiting for the dump. please upload.
UNITED STATES


Anonymous 7/16/2023 11:05:00 AM

upload cks exam questions
Anonymous


Johan 12/13/2023 8:16:00 AM

awesome training material
NETHERLANDS


PC 7/28/2023 3:49:00 PM

where is dump
Anonymous


YoloStar Yoloing 10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.
Anonymous


Zelalem Nega 5/14/2023 12:45:00 PM

please i need if possible h12-831,
UNITED KINGDOM


unknown-R 11/23/2023 7:36:00 AM

good collection of questions and solution for pl500 certification
UNITED STATES


Swaminathan 5/11/2023 9:59:00 AM

i would like to appear the exam.
Anonymous


Veenu 10/24/2023 6:26:00 AM

i am very happy as i cleared my comptia a+ 220-1101 exam. i studied from as it has all exam dumps and mock tests available. i got 91% on the test.
Anonymous


Karan 5/17/2023 4:26:00 AM

need this dump
Anonymous


Ramesh Kutumbaka 12/30/2023 11:17:00 PM

its really good to eventuate knowledge before appearing for the actual exam.
Anonymous