An administrator wants to block an application by its path instead of reputation. The following steps have already been taken:Go to Enforce > Policies > Select the desired policy >Which additional steps must be taken to complete the task?
An administrator is investigating an alert and reads a summary that says:The application powershell.exe was leveraged to make a potentially malicious network connection.Which action should the administrator take immediately to block that connection?
Which command is used to immediately terminate a current Live Response session?
A user downloaded and executed malware on a system. The malware is actively exfiltrating data.Which immediate action is recommended to prevent further exfiltration?
What are the highest and lowest file reputation priorities, respectively, in VMware Carbon Black Cloud?
What connectivity is required for VMware Carbon Black Cloud Endpoint Standard to perform Sensor Certificate Validation?