Sensor Visibility Exclusion patterns are written in which syntax?
A. Glob Syntax
B. Kleene Star Syntax
C. RegEx
D. SPL(Splunk)
How long are quarantined files stored on the host?
A. 45 Days
B. 30 Days
C. Quarantined files are never deleted from the host
D. 90 Days
How long are quarantined files stored in the CrowdStrike Cloud?
A. 45 Days
B. 90 Days
C. Days
D. Quarantined files are not deleted
You found a list of SHA256 hashes in an intelligence report and search for them using the Hash Execution Search. What can be determined from the results?
A. Identifies a detailed list of all process executions for the specified hashes
B. Identifies hosts that loaded or executed the specified hashes
C. Identifies users associated with the specified hashes
D. Identifies detections related to the specified hashes
What are Event Actions?
A. Automated searches that can be used to pivot between related events and searches
B. Pivotable hyperlinks available in a Host Search
C. Custom event data queries bookmarked by the currently signed in Falcon user
D. Raw Falcon event data
Where can you find hosts that are in Reduced Functionality Mode?
A. Event Search
B. Executive Summary dashboard
C. Host Search
D. Installation Tokens
When analyzing an executable with a global prevalence of common; but you do not know what the executable is. what is the best course of action?
A. Do nothing, as this file is common and well known
B. From detection, click the VT Hash button to pivot to VirusTotal to investigate further
C. From detection, use API manager to create a custom blocklist
D. From detection, submit to FalconX for deep dive analysis
When you configure and apply an IOA exclusion, what impact does it have on the host and what you see in the console?
A. The process specified is not sent to the Falcon Sandbox for analysis
B. The associated detection will be suppressed and the associated process would have been allowed to run
C. The sensor will stop sending events from the process specified in the regex pattern
D. The associated IOA will still generate a detection but the associated process would have been allowed to run
Which of the following tactic and technique combinations is sourced from MITRE ATTandCK information?
A. Falcon Intel via Intelligence Indicator - Domain
B. Machine Learning via Cloud-Based ML
C. Malware via PUP
D. Credential Access via OS Credential Dumping
What happens when you open the full detection details?
A. Theprocess explorer opens and the detection is removed from the console
B. The process explorer opens and you're able to view the processes and process relationships
C. The process explorer opens and the detection copies to the clipboard
D. The process explorer opens and the Event Search query is run for the detection