Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What Falcon Sensor could be used to provide security for an AWS EKS cluster running on Amazon Linux 2–based EC2 instances, including container-level visibility?

A.

Falcon Container Sensor for Linux

B.

Falcon Kubernetes Admission Controller

C.

Image Assessment at Runtime

D.

Falcon Sensor for Linux

Which action is required when creating a new image registry connection that accesses a privately hosted registry?

A.

Verify the registry URL

B.

Confirm expiration date of the secret for any used service accounts

C.

Add CrowdStrike IP addresses to registry allowlists

D.

Verify the token and secret

What is the first step you should take when troubleshooting issues with cloud account registrations?

A.

Immediately reset all user passwords

B.

Disable the account registration feature temporarily

C.

Check the email verification process to ensure users receive verification emails

There is a valid sensor update policy for all Linux hosts that is set to n-2. Some of the hosts have not updated their sensor version.

What is the reason for this situation?

A.

DaemonSet was used for deployment

B.

One-click sensor deployment has not been enabled

C.

None of the hosts have been restarted

How can unassessed images be a security concern in your cloud environment?

A.

They are actively running in your environment but have not been checked for vulnerabilities

B.

They are actively running in your environment but do not have the Falcon Container Sensor installed

C.

They are in one of your connected image registries but have never been actively running in your environment

D.

They are in one of your connected image registries but have not been checked for vulnerabilities

You have 26 public-facing container images with an ExPRT rating of High and an Easily Accessible Exploited Status. Your internal process for patching vulnerable containers requires weeks per image.

How should you prioritize which vulnerabilities to fix first?

A.

Patch the vulnerabilities with the oldest CVE ID first

B.

Prioritize remediation based off of CVSS scores

C.

Take the business offline until all images are patched

D.

Filter by container running status

Where can you check the current status of accounts and identify deployment misconfigurations?

A.

Cloud security – Settings – Automate

B.

Cloud security – Policies – Cloud security posture

C.

Cloud security – Settings – Account registration

D.

Cloud security – Settings – Cloud posture scan settings