Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You must share remediation recommendations for an IOM in Falcon Cloud Security.

What information found within the IOM Remediation link will help your team address the misconfiguration?

A.

Severity of the misconfiguration

B.

Total number of misconfigurations found for the related IOM policy

C.

Related documentation from the cloud provider

You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful but certain CSPM operations, including asset inventories and IOM detection, are failing.

How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?

A.

Check that you have allowlisted the IP addresses provided in the public-facing CrowdStrike documentation

B.

Begin investigating another hypothesis as there is no way blocked traffic could be responsible

C.

Temporarily open up the firewall to all inbound traffic for testing purposes

What is needed to achieve visibility into the latest AWS IAM 1020 restricted use of AWS CloudShell with the latest CIS Foundations Benchmarks for AWS, Azure, and Google Cloud?

A.

Leverage existing IOA policy

B.

Create custom IOA policy

C.

Create custom IOM policy

D.

Leverage existing IOM policy

You are reviewing Top IOMs and find that MFA for Azure has 62 findings indicating MFA has not been configured across all accounts.

Which options provide a more detailed investigation?

A.

Identity & Cloud group

B.

Event search & Asset graph

C.

CloudTrail logging & Application Registration

What is a valid reason for adding your base images into Falcon Cloud Security?

A.

Base image CVEs cannot be exploited by adversaries

B.

All base image CVEs are less risky than other CVEs

C.

Reduce duplicates when a base image is used multiple times

You are investigating potential data exfiltration by reviewing IOAs in Falcon Cloud Security. You must check for any evidence of Defense Evasion via Impair Defenses: Disable or Modify Tools activity in your Azure environment.

Which IOA filters meet those requirements to identify any related IOAs?

A.

MITRE Tactic and Technique – Cloud provider

B.

Attack type – Cloud provider

C.

MITRE Tactic and Technique – Service

D.

Attack type – Service

When should you enable Drift Prevention for containers?

A.

When containers are used for development and testing

B.

When images launch and need to download and install packages

C.

When your workloads have been designed to be immutable

D.

When deploying a brand new image

You no longer want to see vulnerabilities for images that are older than 90 days.

What is the most efficient way to achieve this?

A.

Use a Fusion workflow to hide the results for any images older than 90 days

B.

Delete any images in your registry that are older than 90 days

C.

Use theStop assessing images older than (number) of dayssetting

D.

Manually hide any results older than 90 days

What cloud-conscious attacker behavior is used to allow them to stay hidden in the environment?

A.

Storage Account Networking changed to All Networks

B.

CloudTrail logging disabled

C.

Certificate added to an application registration

D.

EC2 Default security group does not block all traffic

How can you prevent a container process from altering the container's expected behavior?

A.

Enable container drift prevention on the Linux sensor

B.

Create a custom IOA with automated remediation

C.

Enable process modification protection on the Kubernetes Admission Controller

D.

Create an Image Assessment policy to block container drift