Which Windows prevention policy setting monitors contents of shells for execution of malicious content?
Where can you find the history of the successes and failures for any Fusion SOAR workflows?
What is the fastest way to locate inactive sensors in the Falcon console?
What policy setting should be selected for a new host when it has an existing antivirus?
In order to quarantine files on the host, what prevention policy settings must be enabled?
Why would you add IP addresses to a containment policy?
You need to look up a Red Hat Enterprise Linux (RHEL) system in Host Management. What filter would apply?
How are custom roles assigned to users to perform a specific action on a module?
You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?
What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?
|
PDF + Testing Engine
|
|---|
|
$49.5 |
|
Testing Engine
|
|---|
|
$37.5 |
|
PDF (Q&A)
|
|---|
|
$31.5 |
CrowdStrike Free Exams |
|---|
|