Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does the Falcon sensor for Windows contribute to the enforcement in Falcon Identity Protection?

A.

Enforces strict password complexity rules for user accounts

B.

Encrypts network traffic to ensure secure communication

C.

Manages user access and permissions on domain controllers

D.

Collects and validates domain authentication events

How does CrowdStrike Falcon Identity Protection help customers identify different types of accounts in their domain?

A.

Implements advanced encryption algorithms for account metadata

B.

Assigns a human authorizer to each programmatic account for approval

C.

Analyzes authentication traffic and automatically classifies programmatic and human accounts

D.

Conducts regular vulnerability assessments on programmatic accounts

What is the recommended action for the"Guest Account Enabled"risk?

A.

Add related endpoints to a watchlist

B.

Apply a policy rule with an "Access" trigger and "Block" action on the Guest account

C.

Disable Guest accounts on all endpoints

D.

Disable the endpoint in Active Directory

Which of the following isNOTan available Goal within the Domain Security Overview?

A.

Privileged Users Management

B.

Business Privileged Users Management

C.

AD Hygiene

D.

Pen Testing

Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?

A.

Falcon Fusion is not identity based

B.

Falcon Fusion will only work with certain users

C.

Falcon Fusion will only send emails to the user

D.

Falcon Fusion works with your IT policy enforcement through the use of identity and behavioral analytics

When an endpoint that has not been used in the last90 daysbecomes active, a detection forUse of Stale Endpointis reported.

A.

180 days

B.

90 days

C.

30 days

D.

60 days

Considering the following example, what MITRE ATT&CK tactic would you use to complete the workflow?

A.

Initial Access

B.

Credential Access

C.

Lateral Movement

D.

Privilege Escalation

What does a modern Zero Trust security architecture offer compared to a traditional wall-and-moat (perimeter-based firewall) approach?

A.

Applies machine learning to gauge the trustworthiness of any external entities

B.

Secures the perimeter of a network and does not allow access to any entities deemed “zero trust”

C.

Issues trust certificates to internal entities and zero trust certificates to external entities

D.

Continuously authenticates entities regardless of origin

Under which CrowdStrike documentation category could you find Identity Protection API information?

A.

Tools and Reference

B.

Falcon Management

C.

CrowdStrike Store

D.

CrowdStrike APIs

Where in the Identity Protection module can one view the monitoring status of domain controllers?

A.

Settings

B.

System Notifications

C.

Domains

D.

Connectors