Q: 11
How long does the CrowdStrike Falcon platform retain inactive sensors by default before they are
automatically removed from the system?
Options
Discussion
D makes sense. The Falcon docs say inactive sensors stick around for 90 days before auto-removal by default, no custom retention unless you set one. Pretty sure that's standard unless there's a specific policy override, but open if anyone's seen otherwise.
Probably D. Falcon holds inactive sensors for 90 days before removing them by default, that's straight from the product docs. I think B (365 days) would only apply in case of custom retention, not out-of-the-box settings.
Actually it's D. Default retention for inactive sensors is 90 days, not a year like some think.
Hard to say, I saw something similar on practice exams. D
Be respectful. No spam.
Q: 12
You are beginning the rollout of the Falcon Sensor for the first time side-by-side with your existing
security solution. You need to configure the Machine Learning levels of the Prevention Policy so it does
not interfere with existing solutions during the testing phase. What settings do you choose?
Options
Discussion
Its D
Be respectful. No spam.
Q: 13
What is the purpose of using the "Group Assignment" filter on the Host Management page?
Options
Discussion
A tbh
Probably A here. The Group Assignment filter just lets you see hosts by the groups they belong to, so you can manage or review specific sets. I don't think it does OS or online status. Anyone want to argue for D?
A is the one here, pretty sure. The Group Assignment filter helps categorize hosts by their assigned groups, makes managing large environments simpler. Saw similar wording in official guide and labs.
Be respectful. No spam.
Q: 14
Which of the following scenarios is a valid use case for disabling detections on a host?
Options
Discussion
Option C. I encountered exactly similar question in my exam and it's the valid case here.
D makes more sense to me, since disabling detections could help lower resource use when CPU is maxed out. Not sure though.
Be respectful. No spam.
Q: 15
What best describes what happens to detections in the console after clicking "Enable Detections" for a
host which previously had its detections disabled?
Options
Discussion
I don't think it's C. B. I figured when you re-enable detections, the console might pull in some historical events that happened while detections were off. Maybe I'm mixing it up with another EDR, but pretty sure I saw similar behavior before. If anyone can confirm 100%, let me know.
Its C. When you hit Enable Detections, only new detections start coming in for that host. B's a trap since Falcon doesn't go back and recover old detections when re-enabled. Pretty sure that's standard behavior, unless something changed.
Yeah, C makes sense. You only see new detections after you turn it back on, nothing from before comes back. That's how CrowdStrike works as far as I know. Let me know if there's edge cases I missed.
C is right. Once you re-enable detections, only new alerts show up in the console for that host. Anything that happened while detections were off won't get restored. Pretty sure that's how Falcon handles it, but correct me if I'm off.
Be respectful. No spam.
Q: 16
Which of the following is the recommended best practice when creating and managing user accounts in
CrowdStrike Falcon?
Options
Discussion
Option B matches what I got in a mock exam. Custom roles let you enforce least privilege, which is what CrowdStrike wants for RBAC. Makes sense to tailor permissions to actual responsibilities. Pretty sure about this, but open to other views.
Probably B, saw a similar question in other exam reports and they always point to custom roles.
Its B but if the question said "least effort" instead of "best practice" then maybe D would be picked.
Be respectful. No spam.
Q: 17
An organization wants to separate their Windows servers and Windows workstations into different groups
for applying distinct policies. What is the most appropriate way to assign these endpoints to groups in
CrowdStrike Falcon?
Options
Discussion
Yep, grouping by OS type just makes sense in Falcon if the goal is to split policies between servers and workstations. A is what I'd choose here, as it's straightforward and scalable. Pretty sure that's how it's done in most setups but open to other ideas if anyone disagrees.
A is the way to go. Grouping by OS type matches up with Falcon’s dynamic groups, so you can assign server policies separate from workstations automatically. Makes everything cleaner, fewer mistakes too. Anyone else doing it another way?
A imo, grouping by OS type is clear and directly targets the need for policy separation between servers and workstations. It’s what I've seen in similar exam scenarios and makes policy application much easier to manage. Simple question, well written too.
Be respectful. No spam.
Q: 18
When editing an existing IOA exclusion, what can NOT be edited?
Options
Discussion
Pretty sure it's not C, it's A. The IOA name can't be changed after creation, that's locked in. I've seen a similar question on a practice test and C is just there to trip you up.
I don’t think it’s C. A is correct since the IOA name is set when created, trap is exclusion name.
Honestly, these IOA exclusion editing questions can be annoying. A
Be respectful. No spam.
Q: 19
How does the Unique Hosts Connecting to Countries Map help an administrator?
Options
Discussion
C or D. Both sound like the map's for spotting threats, so not sure which fits better here.
Be respectful. No spam.
Q: 20
What is the primary indicator of an inactive CrowdStrike Falcon sensor in the Falcon console?
Options
Discussion
D , since "Last Seen" not matching the check-in interval is what actually shows inactivity. A is tempting but only reflects a status label, D is the real detection. Seen similar wording in practice sets.
Super clear question, definitely D.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2