Q: 11
A security team is reviewing an image assessment report for a containerized application. The report
indicates multiple high-severity Common Vulnerabilities and Exposures (CVEs) related to outdated
system libraries in the base image. What is the best course of action to mitigate these vulnerabilities
before deploying the container?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
A security engineer is conducting a review of cloud security controls within an AWS environment
protected by CrowdStrike Falcon. During the evaluation, the engineer identifies that an attacker could
gain elevated permissions through misconfigured IAM policies. Which of the following is the most likely
misconfiguration leading to this high-risk practice?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
A security team wants to configure scheduled reports in CrowdStrike to track cloud security risks and
compliance over time. Which of the following is a requirement for successfully setting up and using
scheduled reports?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
A healthcare organization is required to comply with HIPAA regulations and is using CrowdStrike Falcon
to monitor and enforce security rules in its AWS, Azure, and Google Cloud environments. Which security
rule implementation is most effective in ensuring compliance while mitigating threats?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
An organization is attempting to register its AWS account with CrowdStrike Falcon Cloud, but the
process fails. The error message indicates insufficient permissions. The security team verifies that the
CrowdStrike Falcon role was created in AWS IAM. What is the most likely cause of this issue?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
When configuring an automated remediation workflow for AWS findings in Falcon Fusion, why is it
important to perform a dry run before enabling the workflow in production?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
A security administrator is configuring pre-runtime protection in CrowdStrike Falcon to ensure that only
trusted container images from specific registries are scanned and allowed for deployment. What is the
best approach for adding registry connection details?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
After identifying excessive permissions and missing MFA in IAM configurations, which remediation
strategy is most aligned with CrowdStrike CIEM’s recommendations?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
What is the most critical prerequisite when registering a cloud account with CrowdStrike Falcon?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
You are using the CrowdStrike Falcon platform to review a container image for vulnerabilities. During
the analysis, the platform identifies a critical vulnerability in one of the installed packages. What is the
next best action to mitigate this vulnerability effectively?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2