As a Falcon Administrator, you must add access for an analyst to review cloud control plane IOMs.
What least privilege role should you assign them?
You receive an alert for suspicious network traffic from a container environment over destination port 1337.
What is the most efficient way to find which container and pod the connections are sourcing from using Cloud Security?
Which action is required when creating a new image registry connection that accesses a privately hosted registry?
What is the recommended method to block a specific CVE for 14 days when creating an Image assessment policy exclusion?
What are three valid states for the state of a port under the Network Events dashboard?
Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.
How can you automatically distribute the vulnerable container information from Cloud Security?
Your organization is deploying containerized applications in a cloud environment. You must ensure that container images are free of vulnerabilities before being deployed into production. The solution must integrate seamlessly with your CI/CD pipeline to automate image scanning during the build process.
Which image assessment method is in accordance with CrowdStrike best practices?
You are investigating unassessed images using Falcon Cloud Security.
What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?
What is a primary function of the Containers and Images Compliance dashboard in CrowdStrike's Cloud Security platform?
You want to customize the GKE autopilot policy by updating the detection severity (Critical) and the detection type (CIS benchmark deviation) along with Vulnerability ExPRT.ai severities (Critical).
Which combination will trigger the prevention?
What is a primary benefit of using CrowdStrike's suite of cloud security products?
What cloud-conscious attacker behavior is used to allow them to stay hidden in the environment?
What allows you to block a specific vulnerability for a user-specified amount of time when creating an image assessment policy exclusion?