Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which option best describes the general process Whereinstallation of the Falcon Sensor on MacOS?

A.

Grant the Falcon Package Full Disk Access, install the Falcon package, use falconctl to license the sensor

B.

Install the Falcon package passing it the installation token in the command line

C.

Install the Falcon package, use falconctl to license the sensor, approve the system extension, grant the sensor Full Disk Access

D.

Grant the Falcon Package Full Disk Access, install the Falcon package, load the Falcon Sensor with the command 'falconctl stats'

Full Access
Question # 5

On which page of the Falcon console would you create sensor groups?

A.

User management

B.

Sensor update policies

C.

Host management

D.

Host groups

Full Access
Question # 6

What is the function of a single asterisk (*) in an ML exclusion pattern?

A.

The single asterisk will match any number of characters, including none. It does include separator characters, such as \ or /, which separate portions of a file path

B.

The single asterisk will match any number of characters, including none. It does not include separator characters, such as \ or /, which separate portions of a file path

C.

The single asterisk is the insertion point for the variable list that follows the path

D.

The single asterisk is only used to start an expression, and it represents the drive letter

Full Access
Question # 7

Which of the following can a Falcon Administrator edit in an existing user's profile?

A.

First or Last name

B.

Phone number

C.

Email address

D.

Working groups

Full Access
Question # 8

Where do you obtain the Windows sensor installer for CrowdStrike Falcon?

A.

Sensors are downloaded from the Hosts > Sensor Downloads

B.

Sensor installers are unique to each customer and must be obtained from support

C.

Sensor installers are downloaded from the Support section of the CrowdStrike website

D.

Sensor installers are not used because sensors are deployed from within Falcon

Full Access
Question # 9

Which is a filter within the Host setup and management > Host management page?

A.

User name

B.

OU

C.

BIOS Version

D.

Locality

Full Access
Question # 10

Custom IOA rules are defined using which syntax?

A.

Glob

B.

PowerShell

C.

Yara

D.

Regex

Full Access
Question # 11

Which of the following roles allows a Falcon user to create Real Time Response Custom Scripts?

A.

Real Time Responder – Administrator

B.

Real Time Responder – Read Only Analyst

C.

Real Time Responder – Script Developer

D.

Real Time Responder – Active Responder

Full Access
Question # 12

Which command would tell you if a Falcon Sensor was running on a Windows host?

A.

cswindiag.exe -status

B.

netstat.exe -f

C.

sc.exe query csagent

D.

sc.exe query falcon

Full Access
Question # 13

How do you find a list of inactive sensors?

A.

The Falcon platform does not provide reporting for inactive sensors

B.

A sensor is always considered active until removed by an Administrator

C.

Run the Inactive Sensor Report in the Host setup and management option

D.

Run the Sensor Aging Report within the Investigate option

Full Access
Question # 14

After Network Containing a host, your Incident Response team states they are unable to remotely connect to the host. Which of the following would need to be configured to allow remote connections from specified IP's?

A.

Response Policy

B.

Containment Policy

C.

Maintenance Token

D.

IP Allowlist Management

Full Access
Question # 15

When configuring a specific prevention policy, the admin can align the policy to two different types of groups, Host Groups and which other?

A.

Custom IOA Rule Groups

B.

Custom IOC Groups

C.

Enterprise Groups

D.

Operating System Groups

Full Access
Question # 16

You want to create a detection-only policy. How do you set this up in your policy's settings?

A.

Enable the detection sliders and disable the prevention sliders. Then ensure that Next Gen Antivirus is enabled so it will disable Windows Defender.

B.

Select the "Detect-Only" template. Disable hash blocking and exclusions.

C.

You can't create a policy that detects but does not prevent. Use Custom IOA rules to detect.

D.

Set the Next-Gen Antivirus detection settings to the desired detection level and all the prevention sliders to disabled. Do not activate any of the other blocking or malware prevention options.

Full Access
Question # 17

What information does the API Audit Trail Report provide?

A.

A list of analyst login activity

B.

A list of specific changes to prevention policy

C.

A list of actions taken via Falcon OAuth2-based APIs

D.

A list of newly added hosts

Full Access
Question # 18

Where can you modify settings to permit certain traffic during a containment period?

A.

Prevention Policy

B.

Host Settings

C.

Containment Policy

D.

Firewall Settings

Full Access
Question # 19

What model is used to create workflows that would allow you to create custom notifications based on particular events which occur in the Falcon platform?

A.

For - While statement(s)

B.

Trigger, condition(s) and action(s)

C.

Event trigger(s)

D.

Predefined workflow template(s)

Full Access
Question # 20

The Falcon sensor uses certificate pinning to defend against man-in-the-middle attacks. Which statement is TRUE concerning Falcon sensor certificate validation?

A.

SSL inspection should be configured to occur on all Falcon traffic

B.

Some network configurations, such as deep packet inspection, interfere with certificate validation

C.

HTTPS interception should be enabled to proceed with certificate validation

D.

Common sources of interference with certificate pinning include protocol race conditions and resource contention

Full Access
Question # 21

When a host is placed in Network Containment, which of the following is TRUE?

A.

The host machine is unable to send or receive network traffic outside of the local network

B.

The host machine is unable to send or receive network traffic except to/from the Falcon Cloud and traffic allowed in the Firewall Policy

C.

The host machine is unable to send or receive any network traffic

D.

The host machine is unable to send or receive network traffic except to/from the Falcon Cloud and any resources allowlisted in the Containment Policy

Full Access
Question # 22

Which of the following best describes the Default Sensor Update policy?

A.

The Default Sensor Update policy does not have the "Uninstall and maintenance protection" feature

B.

The Default Sensor Update policy is only used for testing sensor updates

C.

The Default Sensor Update policy is a "catch-all" policy

D.

The Default Sensor Update policy is disabled by default

Full Access
Question # 23

What is the goal of a Network Containment Policy?

A.

Increase the aggressiveness of the assigned prevention policy

B.

Limit the impact of a compromised host on the network

C.

Gain more visibility into network activities

D.

Partition a network for privacy

Full Access
Question # 24

Where should you look to find the history of the successes and failures for any Falcon Fusion workflows?

A.

Workflow Execution log

B.

Falcon Ul Audit Trail

C.

Workflow Audit log

D.

Custom Alert History

Full Access
Question # 25

When editing an existing IOA exclusion, what can NOT be edited?

A.

The IOA name

B.

All parts of the exclusion can be changed

C.

The exclusion name

D.

The hosts groups

Full Access
Question # 26

You are evaluating the most appropriate Prevention Policy Machine Learning slider settings for your environment. In your testing phase, you configure the Detection slider as Aggressive. After running the sensor with this configuration for 1 week of testing, which Audit report should you review to determine the best Machine Learning slider settings for your organization?

A.

Prevention Policy Audit Trail

B.

Prevention Policy Debug

C.

Prevention Hashes Ignored

D.

Machine-Learning Prevention Monitoring

Full Access
Question # 27

What best describes what happens to detections in the console after clicking "Enable Detections" for a host which previously had its detections disabled?

A.

Enables custom detections for the host

B.

New detections will start appearing in the console, and all retroactive stored detections will be restored to the console for that host

C.

New detections will start appearing in the console immediately. Previous detections will not be restored to the console for that host

D.

Preventions will be enabled for the host

Full Access
Question # 28

What should be disabled on firewalls so that the sensor's man-in-the-middle attack protection works properly?

A.

Deep packet inspection

B.

Linux Sub-System

C.

PowerShell

D.

Windows Proxy

Full Access
Question # 29

You notice there are multiple Windows hosts in Reduced functionality mode (RFM). What is the most likely culprit causing these hosts to be in RFM?

A.

A Sensor Update Policy was misconfigured

B.

A host was offline for more than 24 hours

C.

A patch was pushed overnight to all Windows systems

D.

A host was placed in network containment from a detection

Full Access
Question # 30

How do you disable all detections for a host?

A.

Create an exclusion rule and apply it to the machine or group of machines

B.

Contact support and provide them with the Agent ID (AID) for the machine and they will put it on the Disabled Hosts list in your Customer ID (CID)

C.

You cannot disable all detections on individual hosts as it would put them at risk

D.

In Host Management, select the host and then choose the option to Disable Detections

Full Access
Question # 31

Where can you find your company's Customer ID (CID)?

A.

The CID is a secret key used for Falcon communication and is never shared with the customer

B.

The CID is only available by calling support

C.

The CID is located at Hosts setup and management > Deploy > Sensor Downloads and is listed along with the

checksum

D.

The CID is located at Hosts > Host Management

Full Access
Question # 32

Which of the following is TRUE regarding Falcon Next-Gen AntiVirus (NGAV)?

A.

Falcon NGAV relies on signature-based detections

B.

Activating Falcon NGAV will also enable all detection and prevention settings in the entire policy

C.

The Detection sliders cannot be set to a value less aggressive than the Prevention sliders

D.

Falcon NGAV is not a replacement for Windows Defender or other antivirus programs

Full Access
Question # 33

Which statement describes what is recommended for the Default Sensor Update policy?

A.

The Default Sensor Update policy should align to an organization's overall sensor updating practice while leveraging Auto N-1 and Auto N-2 configurations where possible

B.

The Default Sensor Update should be configured to always automatically upgrade to the latest sensor version

C.

Since the Default Sensor Update policy is pre-configured with recommend settings out of the box, configuration of the Default Sensor Update policy is not required

D.

No configuration is required. Once a Custom Sensor Update policy is created the Default Sensor Update policy is disabled

Full Access
Question # 34

How many "Auto" sensor version update options are available for Windows Sensor Update Policies?

A.

1

B.

2

C.

0

D.

3

Full Access
Question # 35

When uninstalling a sensor, which of the following is required if the 'Uninstall and maintenance protection' setting is enabled within the Sensor Update Policies?

A.

Maintenance token

B.

Customer ID (CID)

C.

Bulk update key

D.

Agent ID (AID)

Full Access
Question # 36

Under which scenario can Sensor Tags be assigned?

A.

While triaging a detection

B.

While managing hosts in the Falcon console

C.

While updating a sensor in the Falcon console

D.

While installing a sensor

Full Access
Question # 37

When creating new IOCs in IOC management, which of the following fields must be configured?

A.

Hash, Description, Filename

B.

Hash, Action and Expiry Date

C.

Filename, Severity and Expiry Date

D.

Hash, Platform and Action

Full Access
Question # 38

What is likely the reason your Windows host would be in Reduced Functionality Mode (RFM)?

A.

Microsoft updates altering the kernel

B.

The host lost internet connectivity

C.

A misconfiguration in your prevention policy for the host

D.

A Sensor Update Policy was misconfigured

Full Access
Question # 39

When creating a custom IOA for a specific domain, which syntax would be best for detecting or preventing on all subdomains as well?

A.

*\.baddomain\.xyz|baddomain\. xyz

B.

*baddomain\. xyz|baddomain\. xyz. *

C.

Custom IOA rules cannot be created for domains

D.

**baddomain\. xyz|baddomain\. xyz**

Full Access
Question # 40

One of your development teams is working on code for a new enterprise application but Falcon continually flags the execution as a detection during testing. All development work is required to be stored on a file share in a folder called "devcode." What setting can you use to reduce false positives on this file path?

A.

USB Device Policy

B.

Firewall Rule Group

C.

Containment Policy

D.

Machine Learning Exclusions

Full Access
Question # 41

You are attempting to install the Falcon sensor on a host with a slow Internet connection and the installation fails after 20 minutes. Which of the following parameters can be used to override the 20-minute default provisioning window?

A.

ExtendedWindow=1

B.

Timeout=0

C.

ProvNoWait=1

D.

Timeout=30

Full Access
Question # 42

What impact does disabling detections on a host have on an API?

A.

Endpoints with detections disabled will not alert on anything until detections are enabled again

B.

Endpoints cannot have their detections disabled individually

C.

DetectionSummaryEvent stops sending to the Streaming API for that host

D.

Endpoints with detections disabled will not alert on anything for 24 hours (by default) or longer if that setting is changed

Full Access
Question # 43

You need to export a list of all deletions for a specific Host Name in the last 24 hours. What is the best way to do this?

A.

Go to Host Management in the Host page. Select the host and use the Export Detections button

B.

Utilize the Detection Resolution Dashboard. Use the filters to focus on the appropriate hostname and time, then export the results from the "Detection Resolution History" section

C.

In the Investigate module, access the Detection Activity page. Use the filters to focus on the appropriate hostname and time, then export the results

D.

Utilize the Detection Activity Dashboard. Use the filters to focus on the appropriate hostname and time, then export the results from the "Detections by Host" section

Full Access
Question # 44

What is the name for the unique host identifier in Falcon assigned to each sensor during sensor installation?

A.

Endpoint ID (EID)

B.

Agent ID (AID)

C.

Security ID (SID)

D.

Computer ID (CID)

Full Access