Which report would show you an overview of the top ten most-applied policies by sensors in your environment?
To improve the organization’s security posture, you are designing a Fusion SOAR workflow to generate an alert when critical vulnerabilities are detected by Falcon. When creating a new workflow from scratch, what component of the workflow must be configured first?
Your incident responder team is migrating existing workflows into Fusion SOAR workflows so that they execute natively in Falcon. The workflow imports are failing. What format must the workflows be in order to successfully import them into Fusion SOAR?
When configuring a third-party integration to communicate with the Falcon API, which credential combination must be generated first?
Where can you find hosts that have been offline for ten minutes or longer?
Which default user role will allow you to see all analyst session details?
Your organization wants to monitor the use of remote access software that is currently authorized. The executable is called remote.exe. How would you trigger a detection for review of any process named remote.exe?
What is an example of when you will need to refer to your Customer ID+ Checksum (CIDC)?
Which report provides a filterable high-level overview of host information such as OS version, Device Type and Machine Domain, and also provides an active sensor heat map for a quick environment review?
You are tasked with creating a “Workstations” host group to encompass all workstations in your environment. Which dynamic grouping criteria will most efficiently accomplish this task?
What action should you take to securely allow operating system update processes to occur during network containment?
What are the components that must be allowed to manually install Falcon Sensor on macOS?
Your organization has determined that your cybersecurity architect needs to be notified via email whenever Falcon generates detections of a medium severity or higher. Additionally, the architect should be notified about any incidents with a CrowdScore of 1.0 or higher. What can the Falcon Administrator do to ensure the architect is properly alerted?
Your development team is working on a new enterprise application, but Falcon starts creating alerts during testing. The alert points to “C:\Users\Bob\DevCode\felix.dll”. In the detection, you see that it is triggering only on a specific Falcon IOA. What would be the best course of action for this situation?
You are tasked with creating a group for hosts running Windows 10. What kind of group should you create to make sure all applicable hosts are included in your environment?
You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?
When searching for a host network address, which IP notation should be used?
What is the primary concern with Windows sensors going into Reduced Functionality Mode?
Which setting inside the Sensor Update Policy prevents unauthorized uninstallation?
You need to look up a Red Hat Enterprise Linux (RHEL) system in Host Management. What filter would apply?
An inactive host does not contact the Falcon cloud. What is the default number of days after which it is automatically removed from the Host Management page?
You have created a new static host group to test a newly created sensor update policy, and need to add 500 servers into the group. You want to upload a list of hosts to Falcon for automatic addition into the group. What file format must the list be for this to be successfully accomplished?
A Falcon Administrator is unable to initiate a Real-Time Response (RTR) session. What is the most likely cause?