CrowdStrike Falcon Certification Program Questions and Answers
How are sensor updates managed and enforced across multiple hosts in Falcon?
Your incident responder team is migrating existing workflows into Fusion SOAR workflows so that they execute natively in Falcon. The workflow imports are failing. What format must the workflows be in order to successfully import them into Fusion SOAR?
Where can you find a list of hosts that have not communicated with the CrowdStrike Cloud?
Where can you find hosts that have been offline for ten minutes or longer?
Which statement best describes user permissions in Falcon?
Which Windows prevention policy setting monitors contents of shells for execution of malicious content?
What happens when a Falcon Sensor on a Linux host enters Reduced Functionality Mode?
You have 100 hashes that have been prohibited by management and need to be blocked within your organization. Using Falcon, what is the best way to accomplish this?
Which role allows a Falcon user to create Real Time Response Custom Scripts?
What is true about the Default Sensor Policy?
What policy setting should be selected for a new host when it has an existing antivirus?
Which setting inside the Sensor Update Policy prevents unauthorized uninstallation?
When using Microsoft Windows, what command verifies that a Falcon Sensor is running?
You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?
What is true about User Accounts created by the Falcon Administrator?
What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?
What happens to policy assignment when a host does not match any custom host group criteria?
To improve the organization’s security posture, you are designing a Fusion SOAR workflow to generate an alert when critical vulnerabilities are detected by Falcon. When creating a new workflow from scratch, what component of the workflow must be configured first?
What happens to detections in the console after clicking “Disable Detections” for a host from within the Host Management page?
Which ML exclusion pattern would be the most accurate for all .exe binaries in “C:\Program Files\Software\”, including any subfolders of Software?
What prevention policy settings must be enabled to quarantine files on the host?
In order to prevent duplicate Agent IDs, what install parameter should be used on VMs to be used as persistent clones?
From the Host management page, what is the best field to filter by for Domain Controllers to obtain sensor version information?
When searching for a host network address, which IP notation should be used?
Your leadership wants controls in place for immediate action on any OverWatch detections. What should you do to ensure the host is contained quickly and notifies the appropriate staff?
Which report provides a filterable high-level overview of host information such as OS version, Device Type and Machine Domain, and also provides an active sensor heat map for a quick environment review?
How can you search for multiple hostnames at the same time via Host Management?
You are assigning sensor group tags during installation. What is the maximum allowed length of all tags?
How are custom roles assigned to users to perform a specific action on a module?
What is the purpose of the Machine-Learning Prevention Monitoring Audit Log?