What Approved list mechanism will allow this application to run in your environment while maintaining the most secure posture?

An organization using VMware Carbon Black makes use of an unsigned third party application that is critical to business function. Unfortunately, the application has a reputation of Potentially Unwanted Program and is prevented from running based on the policy.
What Approved list mechanism will allow this application to run in your environment while maintaining the most secure posture?
A. MD5 Hash based
B. Certs based
C. IT Tools based
D. SHA-256 Hash based

microsoft-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.