How can you find a list of hosts that have not communicated with the CrowdStrike Cloud in the last 30 days?
Which exclusion pattern will prevent detections on a file at C:\Program Files\My Program\My Files\program.exe?
Which of the following tools developed by Crowdstrike is intended to help with removal of the CrowdStrike Windows Falcon Sensor?
Which of the following is a valid step when troubleshooting sensor installation failure?
An analyst has reported they are not receiving workflow triggered notifications in the past few days. Where should you first check for potential failures?
You need to have the ability to monitor suspicious VBA macros. Which Sensor Visibility setting should be turned on within the Prevention policy settings?
You are beginning the rollout of the Falcon Sensor for the first time side-by-side with your existing security solution. You need to configure the Machine Learning levels of the Prevention Policy so it does not interfere with existing solutions during the testing phase. What settings do you choose?
You are attempting to install the Falcon sensor on a host with a slow Internet connection and the installation fails after 20 minutes. Which of the following parameters can be used to override the 20-minute default provisioning window?
When configuring a specific prevention policy, the admin can align the policy to two different types of groups, Host Groups and which other?
When creating an API client, which of the following must be saved immediately since it cannot be viewed again after the client is created?
Which of the following pages provides a count of sensors in Reduced Functionality Mode (RFM) by Operating System?
A sensor that has not contacted the Falcon cloud will be automatically deleted from the hosts list after how many days?
What would be the most appropriate action to take if you wanted to prevent a folder from being uploaded to the cloud without disabling uploads globally?
Which of the following roles allows a Falcon user to create Real Time Response Custom Scripts?
Which of the following uses Regex to create a detection or take a preventative action?
You have a new patch server that should be reachable while hosts in your environment are network contained. The server's IP address is static and does not change. Which of the following is the best approach to updating the Containment Policy to allow this?
When uninstalling a sensor, which of the following is required if the 'Uninstall and maintenance protection' setting is enabled within the Sensor Update Policies?
When creating a custom IOA for a specific domain, which syntax would be best for detecting or preventing on all subdomains as well?
How many days will an inactive host remain visible within the Host Management or Trash pages?
Which option best describes the general process Whereinstallation of the Falcon Sensor on MacOS?
You want the Falcon Cloud to push out sensor version changes but you also want to manually control when the sensor version is upgraded or downgraded. In the Sensor Update policy, which is the best Sensor version option to achieve these requirements?
Your organization has a set of servers that are not allowed to be accessed remotely, including via Real Time Response (RTR). You already have these servers in their own Falcon host group. What is the next step to disable RTR only on these hosts?
Which of the following Machine Learning (ML) sliders will only detect or prevent high confidence malicious items?
Which of the following is an effective Custom IOA rule pattern to kill any process attempting to access www.badguydomain.com?
Why do Sensor Update policies need to be configured for each OS (Windows, Mac, Linux)?
In order to exercise manual control over the sensor upgrade process, as well as prevent unauthorized users from uninstalling or upgrading the sensor, which settings in the Sensor Update Policy would meet this criteria?