<< Prev Question Next Question >>

Question 25/27

An administrator wants to prevent malicious code that has not been seen before from retrieving credentials from the Local Security Authority Subsystem Service, without causing otherwise good applications from being blocked.
Which rule should be used?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (27q)
Question 1: What is a security benefit of VMware Carbon Black Cloud Endp...
Question 2: Which statement is true regarding Blocking/Isolation rules a...
Question 3: An organization is implementing policy rules. The administra...
Question 4: Which permission level is required when a user wants to inst...
Question 5: An administrator would like to proactively know that somethi...
Question 6: An administrator wants to prevent ransomware that has not be...
Question 7: The use of leading wildcards in a query is not recommended u...
Question 8: A user downloaded and executed malware on a system. The malw...
Question 9: Where can a user identify whether a sensor's signature pack ...
Question 10: A security administrator is tasked to investigate an alert a...
Question 11: An administrator has been tasked with preventing the use of ...
Question 12: Which statement accurately characterizes Alerts that are cat...
Question 13: An administrator wants to block ransomware in the organizati...
Question 14: An organization has the following requirements for allowing ...
Question 15: The use of leading wildcards in a query is not recommended u...
Question 16: What is a capability of VMware Carbon Black Cloud?...
Question 17: In which tab of the VMware Carbon Black Cloud interface can ...
Question 18: An administrator is investigating an alert and reads a summa...
Question 19: The administrator has configured a permission rule with the ...
Question 20: A script-based attack has been identified that inflicted dam...
Question 21: Which scenario would qualify for the "Local White" Reputatio...
Question 22: Which VMware Carbon Black Cloud integration is supported for...
Question 23: An administrator is tasked to create a reputation override f...
Question 24: An administrator needs to make sure all files are scanned lo...
Question 25: An administrator wants to prevent malicious code that has no...
Question 26: An administrator needs to fully analyze the relevant informa...
Question 27: An administrator wants to find information about real-world ...