An alert for a device running a proprietary application is tied to a vital business operation.
Which action is appropriate to take?
A
Which wildcard configuration applies a policy to all files and subfolders in a specific folder in
Endpoint
Standard?
B
Reference:
https://community.carbonblack.com/t5/Knowledge-Base/Endpoint-Standard-How-to-
Create-Policy-Blocking-Isolation-and/ta-p/65941
Which statement should be used when constructing queries in Carbon Black Audit and Remediation,
Live
Query?
D
How often do watchlists run?
C
An organization leverages a commonly used software distribution tool to manage deployment of
enterprise software and updates. Custom rules are a suitable option to ensure the approval of files
delivered by this tool.
Which other trust mechanism could the organization configure for large-scale approval of these files?
C
Reference:
https://uit.stanford.edu/service/cbprotect/approval-mechanisms
Refer to the exhibit:
Which two logic statements correctly explain filtering within the UI? (Choose two.)
AD
An administrator wants to query the status of the firewall for all endpoints. The administrator will
query the
registry key found here
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPoli
cy
\StandardProfile.
To make the results easier to understand, the administrator wants to return either enabled or
disabled for the results, rather than the value from the registry key.
Which SQL statement will rewrite the output based on a specific result set returned from the system?
A
Reference:
https://www.carbonblack.com/blog/8-live-queries-that-will-speed-up-your-next-pci-
audit/l
An analyst wants to block an application's specific behavior but does not want to kill the process
entirely as it is heavily used on workstations. The analyst needs to use a Blocking and Isolation Action
to ensure that the process is kept alive while blocking further unwanted activity.
Which Blocking and Isolation Action should the analyst use to accomplish this goal?
B
App Control System Health email alerts for excessive agent backlog are occurring hourly. This is
overwhelming the analysts, and they would like to reduce the notifications.
How can the analyst reduce the unneeded alerts?
B
An administrator needs to query all endpoints in the HR group for instances of an obfuscated copy of
cmd.exe.
Given this Enterprise EDR query:
process_name:cmd.exe AND device_group:HR AND NOT enriched:true
Which example could be added to the query to provide the desired results?
A
A company uses Audit and Remediation to check configurations and adhere to compliance
regulations. The regulations require monthly reporting and twelve months of data retained.
How can an administrator accomplish this requirement with Audit and Remediation?
D
Which list below captures all Enforcement Levels for App Control policies?
C
Reference:
https://www.google.com/url
?
sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiFsPPz04XvAhWRsnEKHV4lBukQFjABegQIA
hAD&
url=https%3A%2F%2Fcommunity.carbonblack.com%2Fgbouw27325%2Fattachments%2Fgbouw2732
5%
2Fproduct-docs-
news%2F2961%2F1%2FVMware%2520Carbon%2520Black%2520App%2520Control%
25208.5.0%2520User%2520Guide.pdf&usg=AOvVaw3es_0JTc8-_BifNR4iFiGl (6)
An incorrectly constructed watchlist generates 10,000 incorrect alerts.
How should an administrator resolve this issue?
B
An Enterprise EDR administrator wants to use Watchlists curated by VMware Carbon Black and other
threat intelligence specialists.
How should the administrator add these curated Watchlists from the Watchlists page?
A
Reference:
https://www.google.com/url
?
sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjl1tW404XvAhWZRhUIHSygB74QFjADegQI
ExAD&
url=https%3A%2F%2Fcommunity.carbonblack.com%2Fgbouw27325%2Fattachments%2Fgbouw2732
5%
2Fproduct-docs-news%2F1913%2F18%2FEnterprise%2520EDR%2520Getting%
2520Started.pdf&usg=AOvVaw2_M7opfEgUaIIfutBZChvk (5)
Which identifier is shared by all events when an alert is investigated?
B