An administrator has determined that the following rule was the cause for an unexpected block:[Suspected malware] [Invokes a command interpreter] [Terminate process]All reputations for the process which was blocked show SUSPECT_MALWARE.Which reputation was used by the sensor for the decision to terminate the process?
Which permission level is required when a user wants to install a sensor on a Windows endpoint?
The administrator has configured a permission rule with the following options selected:Application at path: C:\Users\*\Downloads\**Operation Attempt: Performs any operationAction: Bypass -What is the impact, if any, of using the wildcards in the path for this rule?
A security administrator needs to remediate a security vulnerability that may affect the sensors. The administrator decides to use a tool that can provide interaction and remote access for further investigation.Which tool is being used by the administrator?
A security administrator notices an unusual software behavior on an endpoint. The administrator immediately used the search query to collect data and start analyzing indicators to find the solution.What is a pre-requisite step in gathering specific vulnerability data to export it as a CSV file for analysis?
What connectivity is required for VMware Carbon Black Cloud Endpoint Standard to perform Sensor Certificate Validation?