Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does the Unique Hosts Connecting to Countries Map help an administrator?

A.

It highlights countries with known malware

B.

It helps visualize global network communication

C.

It identifies connections containing threats

D.

It displays intrusions from foreign countries

When editing an existing IOA exclusion, what can NOT be edited?

A.

The IOA name

B.

All parts of the exclusion can be changed

C.

The exclusion name

D.

The hosts groups

How many days will an inactive host remain visible within the Host Management or Trash pages?

A.

45 days

B.

15 days

C.

90 days

D.

120 days

After Network Containing a host, your Incident Response team states they are unable to remotely connect to the host. Which of the following would need to be configured to allow remote connections from specified IP's?

A.

Response Policy

B.

Containment Policy

C.

Maintenance Token

D.

IP Allowlist Management

What can exclusions be applied to?

A.

Individual hosts selected by the administrator

B.

Either all hosts or specified groups

C.

Only the default host group

D.

Only the groups selected by the administrator

If a user wanted to install an older version of the Falcon sensor, how would they find the older installer file?

A.

Older versions of the sensor are not available for download

B.

By emailing CrowdStrike support at support@crowdstrike.com

C.

By installing the current sensor and clicking the "downgrade" button during the install

D.

By clicking on "Older versions" links under the Host setup and management > Deploy > Sensor downloads

You have a new patch server that should be reachable while hosts in your environment are network contained. The server's IP address is static and does not change. Which of the following is the best approach to updating the Containment Policy to allow this?

A.

Add an allowlist entry for the individual server's MAC address

B.

Add an allowlist entry containing the host group that the server belongs to

C.

Add an allowlist entry for the individual server's IP address

D.

Add an allowlist entry containing CIDR notation for the /24 network the server belongs to

When the Notify End Users policy setting is turned on, which of the following is TRUE?

A.

End users will not be notified as we would not want to notify a malicious actor of a detection. This setting does not exist

B.

End users will be immediately notified via a pop-up that their machine is in-network isolation

C.

End-users receive a pop-up notification when a prevention action occurs

D.

End users will receive a pop-up allowing them to confirm or refuse a pending quarantine

You have an existing workflow that is triggered on a critical detection that sends an email to the escalation team. Your CISO has asked to also be notified via email with a customized message. What is the best way to update the workflow?

A.

Clone the workflow and replace the existing email with your CISO's email

B.

Add a sequential action to send a custom email to your CISO

C.

Add a parallel action to send a custom email to your CISO

D.

Add the CISO's email to the existing action

One of your development teams is working on code for a new enterprise application but Falcon continually flags the execution as a detection during testing. All development work is required to be stored on a file share in a folder called "devcode." What setting can you use to reduce false positives on this file path?

A.

USB Device Policy

B.

Firewall Rule Group

C.

Containment Policy

D.

Machine Learning Exclusions