New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

IDP Questions and Answers

Question # 6

Which of the following isNOTan available Goal within the Domain Security Overview?

A.

Privileged Users Management

B.

Business Privileged Users Management

C.

AD Hygiene

D.

Pen Testing

Full Access
Question # 7

Which of the following demonstrates a detection is enabled?

A.

The toggle next to the Detection Enabled is marked in gray

B.

The toggle next to the Detection Enabled is marked in green

C.

The detection has a Disabled tag next to it

D.

The detection has an Enabled tag next to it

Full Access
Question # 8

The NIST SP 800-207 framework for Zero Trust Architecture defines validation and authentication standards for users in which network locations?

A.

Only those users inside the network

B.

Only those users accessing the network remotely over VPN

C.

All users both inside and outside of the network

D.

Only those users outside the network

Full Access
Question # 9

Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?

A.

Machine-learning-powered detection rules

B.

API-based connectors

C.

Ingesting logs

D.

The need for string-based queries

Full Access
Question # 10

Which CrowdStrike documentation category would you search to find GraphQL examples?

A.

CrowdStrike APIs

B.

Threat Intelligence

C.

XDR

D.

Identity Protection APIs

Full Access
Question # 11

To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:

A.

Page

B.

Push

C.

Pull

D.

Alarm

Full Access
Question # 12

Describe the difference between a Human account and a Programmatic account.

A.

A human account is an Administrator

B.

A programmatic account is never authorized for multi-factor authentication

C.

A programmatic account is only used interactively

D.

A human account is often used interactively

Full Access
Question # 13

An account without a phone number, operating system, or role of CEO would typically be defined as:

A.

Programmatic

B.

Human

C.

Enterprise

D.

Corporate

Full Access
Question # 14

Which option can be selected from the Threat Hunter menu to open the current Threat Hunter query in a new window as Graph API format?

A.

Export to API Builder

B.

Save as Custom Query

C.

Save as Custom Report

D.

Open Query in API Builder

Full Access
Question # 15

The CISO of your organization recently read a report about the increased usage of identity brokers and is interested in finding a solution for the company. Which of the following makes Falcon Identity a valid solution for the organization?

A.

Provides the ability to audit and record sessions across multiple methods, such as SSH, RDP, and SMB

B.

Falcon Identity is able to be a middleware between Active Directory and a Human Resource Information System (HRIS)

C.

Gives the organization the ability to proactively mitigate risks, as well as protect critical Active Directory infrastructure through Policy Rules

D.

Allows administrators to store and delegate passwords to application servers

Full Access
Question # 16

How should an organization address the domain risk score found in the Domain Security Overview page?

A.

Address the risks on the list from top to bottom as risks are presented in a descending order

B.

Prioritizing the risks by severity, addressing the Medium (Yellow) risks first

C.

Prioritizing the detections by severity, addressing the High (Red) detections first

D.

Prioritizing the risks by severity, addressing the Low (Green) risks first

Full Access
Question # 17

Which of the following best describes how Policy Group and Policy Rule precedence works?

A.

Policy Groups are evaluated in the order in which the groups appear on the page. The Policy Rules within those groups are evaluated in the order in which they appear in the group

B.

There is no precedence with Policy Groups or Policy Rules; they enact policy if the conditions match

C.

Policy Groups only group Policy Rules together. Precedence is dictated by the Rules

D.

Policy Groups are evaluated in the order in which the groups appear on the page; however, Policy Rules within those groups have no precedence

Full Access