Exam Code: 5V0-91.20
Exam Name: VMware Carbon Black Portfolio Skills
Updated: Nov 11, 2024
Q&As: 116
At Passcerty.com, we pride ourselves on the comprehensive nature of our 5V0-91.20 exam dumps, designed meticulously to encompass all key topics and nuances you might encounter during the real examination. Regular updates are a cornerstone of our service, ensuring that our dedicated users always have their hands on the most recent and relevant Q&A dumps. Behind every meticulously curated question and answer lies the hard work of our seasoned team of experts, who bring years of experience and knowledge into crafting these premium materials. And while we are invested in offering top-notch content, we also believe in empowering our community. As a token of our commitment to your success, we're delighted to offer a substantial portion of our resources for free practice. We invite you to make the most of the following content, and wish you every success in your endeavors.
Experience Passcerty.com exam material in PDF version.
Simply submit your e-mail address below to get started with our PDF real exam demo of your VMware 5V0-91.20 exam.
Instant download
Latest update demo according to real exam
Carbon Black App Control maintains an inventory of all interesting (executable) files on endpoints where the agent is installed.
What is the initial inventory procedure called, and how can this process be triggered?
A. Inventorying; enable Discovery mode
B. Baselining; install the agent
C. Discovery; place agent into Disabled mode
D. Initialization; move agent out of Disabled mode
What is the maximum number of binaries (hashes) that can be banned using the web console?
A. 500
B. 600
C. 300
D. 400
Which Sensor Status under Endpoint Health indicates that a system's policy enforcement is disabled, and the sensor is not sending security event data to the cloud?
A. Quarantined
B. Deregistered
C. Inactive
D. Bypass
Which actions are available for Permissions?
A. Approve, Upload, No Upload
B. Deny Operation, Terminate Process
C. Allow, Allow and Log, Bypass
D. Performs any Operation, Runs or is running
An administrator observes the following event detail in the Investigate tab for an application with an unknown reputation making network connections:
Upon further review of the event details returned, the reputation is observed as NOT_LISTED, and the applied (cloud) reputation is UNKNOWN.
Why is the applied (cloud) reputation UNKNOWN and not NOT_LISTED?
A. The sensor demoted the local reputation from UNKNOWN to NOT_LISTED based on the coud reputation.
B. NOT_LISTED was applied by the sensor after observing no cloud reputation, as evidenced by the applied cloud reputation UNKNOWN.
C. The application was UNKNOWN at the time of the event but then later determined to be NOT_LISTED.
D. The sensor demoted the local reputation from NOT_LISTED to UNKNOWN based on the cloud reputation.
Viewing Page 1 of 3 pages. Download PDF or Software version with 116 questions