5V0-91.20 Exam Questions & Answers

Exam Code: 5V0-91.20

Exam Name: VMware Carbon Black Portfolio Skills

Updated: Mar 20, 2024

Q&As: 116

At Passcerty.com, we pride ourselves on the comprehensive nature of our 5V0-91.20 exam dumps, designed meticulously to encompass all key topics and nuances you might encounter during the real examination. Regular updates are a cornerstone of our service, ensuring that our dedicated users always have their hands on the most recent and relevant Q&A dumps. Behind every meticulously curated question and answer lies the hard work of our seasoned team of experts, who bring years of experience and knowledge into crafting these premium materials. And while we are invested in offering top-notch content, we also believe in empowering our community. As a token of our commitment to your success, we're delighted to offer a substantial portion of our resources for free practice. We invite you to make the most of the following content, and wish you every success in your endeavors.


Download Free VMware 5V0-91.20 Demo

Experience Passcerty.com exam material in PDF version.
Simply submit your e-mail address below to get started with our PDF real exam demo of your VMware 5V0-91.20 exam.

Instant download
Latest update demo according to real exam

*Email Address

* Our demo shows only a few questions from your selected exam for evaluating purposes

Free VMware 5V0-91.20 Dumps

Practice These Free Questions and Answers to Pass the VMware Carbon Black EndPoint Protection 2021 Exam

Questions 1

An alert for a device running a proprietary application is tied to a vital business operation. Which action is appropriate to take?

A. Add the application to the Approved List.

B. Terminate the process.

C. Deny the operation.

D. Quarantine the device.

Show Answer
Questions 2

Which two statements are true about Carbon Black alerts? (Choose two.)

A. They can be grouped together.

B. Once received, it can be dismissed in bulk.

C. Once dismissed, the action cannot be undone.

D. Carbon Black does not generate alerts.

E. They are stored for 15 days.

Show Answer
Questions 3

Review the following search:

childproc_name:"rundll32.exe" AND -digsig_result:"Signed" AND path:c:\windows\*

What is this search looking for?

A. Processes being launched by rundll32.exe running out of the windows directory that are not signed

B. Instances of rundll32.exe running out of the windows directory that are not signed

C. Instances of rundll32.exe running out of the windows directory that are signed

D. Processes launching rundll32.exe running out of the windows directory that are not signed

Show Answer
Questions 4

An active compromise is detected on an endpoint. Due to current policies, the compromise was detected but not terminated.

What would be an appropriate action to end the current communication between the device and the attacker?

A. Uninstall the sensor

B. Place the system into bypass mode

C. Place the system into Quarantine D. Remotely scan the endpoint

Show Answer
Questions 5

Given the following query:

SELECT * FROM users WHERE UID >= 500;

Which statement is correct?

A. This query limits the number of columns to display in the results.

B. This query filters results sent to the cloud.

C. This query is missing a parameter for validity.

D. This query returns all accounts found on systems.

Show Answer

Viewing Page 1 of 3 pages. Download PDF or Software version with 116 questions