CrowdStrike Certified Falcon Administrator Questions and Answers
How can you find a list of hosts that have not communicated with the CrowdStrike Cloud in the last 30 days?
When configuring a specific prevention policy, the admin can align the policy to two different types of groups, Host Groups and which other?
What may prevent a user from logging into Falcon via single sign-on (SSO)?
Why is the ability to disable detections helpful?
The Falcon Administrator has created a new prevention policy to apply to the "Servers" group; however, when applying the new prevention policy this group is not appearing in the list of available groups. What is the most likely issue?
What is likely the reason your Windows host would be in Reduced Functionality Mode (RFM)?
An inactive host that does not contact the Falcon cloud will be automatically removed from the Host Management and Trash pages after how many days?
Your organization has a set of servers that are not allowed to be accessed remotely, including via Real Time Response (RTR). You already have these servers in their own Falcon host group. What is the next step to disable RTR only on these hosts?
When the Notify End Users policy setting is turned on, which of the following is TRUE?
You notice there are multiple Windows hosts in Reduced functionality mode (RFM). What is the most likely culprit causing these hosts to be in RFM?
When a host is placed in Network Containment, which of the following is TRUE?
What can the Quarantine Manager role do?
Custom IOA rules are defined using which syntax?
Which of the following is NOT an available action for an API Client?
You want to create a detection-only policy. How do you set this up in your policy's settings?
How can a API client secret be viewed after it has been created?
Which Real Time Response role will allow you to see all analyst session details?
On the Host management page which filter could be used to quickly identify all devices categorized as a "Workstation" by the Falcon Platform?
You have determined that you have numerous Machine Learning detections in your environment that are false positives. They are caused by a single binary that was custom written by a vendor for you and that binary is running on many endpoints. What is the best way to prevent these in the future?
Your CISO has decided all Falcon Analysts should also have the ability to view files and file contents locally on compromised hosts, but without the ability to take them off the host. What is the most appropriate role that can be added to fullfil this requirement?
An analyst is asked to retrieve an API client secret from a previously generated key. How can they achieve this?
Under which scenario can Sensor Tags be assigned?
What can exclusions be applied to?
The Falcon sensor uses certificate pinning to defend against man-in-the-middle attacks. Which statement is TRUE concerning Falcon sensor certificate validation?
Which port and protocol does the sensor use to communicate with the CrowdStrike Cloud?
What is the purpose of using groups with Sensor Update policies in CrowdStrike Falcon?
The Customer ID (CID) is important in which of the following scenarios?
While a host is Network contained, you need to allow the host to access internal network resources on specific IP addresses to perform patching and remediation. Which configuration would you choose?
What would be the most appropriate action to take if you wanted to prevent a folder from being uploaded to the cloud without disabling uploads globally?
You need to have the ability to monitor suspicious VBA macros. Which Sensor Visibility setting should be turned on within the Prevention policy settings?
Which of the following uses Regex to create a detection or take a preventative action?
What is the purpose of the Machine-Learning Prevention Monitoring Report?
The alignment of a particular prevention policy to one or more host groups can be completed in which of the following locations within Falcon?
In order to quarantine files on the host, what prevention policy settings must be enabled?
You have a Windows host on your network in Reduced functionality mode (RFM). While the system is in RFM, which of the following is TRUE?
Which of the following is NOT a way to determine the sensor version installed on a specific endpoint?
When a user initiates a sensor installs, where can the logs be found?
Which of the following is an effective Custom IOA rule pattern to kill any process attempting to access
When troubleshooting the Falcon Sensor on Windows, what is the correct parameter to output the log directory to a specified file?
What type of information is found in the Linux Sensors Dashboard?
You have an existing workflow that is triggered on a critical detection that sends an email to the escalation team. Your CISO has asked to also be notified via email with a customized message. What is the best way to update the workflow?
Even though you are a Falcon Administrator, you discover you are unable to use the "Connect to Host" feature to gather additional information which is only available on the host. Which role do you need added to your user account to have this capability?
Why is it critical to have separate sensor update policies for Windows/Mac/*nix?
Under the "Next-Gen Antivirus: Cloud Machine Learning" setting there are two categories, one of them is "Cloud Anti-Malware" and the other is:
Which option allows you to exclude behavioral detections from the detections page?