What are the three Image properties that can be selected when editing a Cloud Group?
What Falcon Sensor could be used to provide security for an AWS EKS cluster running on Amazon Linux 2–based EC2 instances, including container-level visibility?
You are a cloud security analyst concerned about adversaries obtaining admin privileges in your cloud environments.
Which Cloud Identity Analyzer category should you look at first?
Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?
You need to register one AWS account as part of a deployment of Falcon Cloud Security. You decide to complete the registration process in the Falcon UI.
What will be utilized during this process if you choose the recommended method to register an individual AWS account?
You want to deploy the Falcon sensor using 1-click sensor deployment when AWS Systems Manager is unavailable.
Which IT automation software can you use to generate an inventory of unmanaged workloads?
You suspect that there is malware in one of your container images.
What can you investigate to confirm this?
What is the recommended method to block a specific CVE for 14 days when creating an Image assessment policy exclusion?
You are concerned about an overprivileged cloud identity.
What steps should you take to identify issues with the account's permissions?
There is a valid sensor update policy for all Linux hosts that is set to n-2. Some of the hosts have not updated their sensor version.
What is the reason for this situation?
As a Falcon Administrator, you must add access for an analyst to review cloud control plane IOMs.
What least privilege role should you assign them?
What is a primary function of the Containers and Images Compliance dashboard in CrowdStrike's Cloud Security platform?
You no longer want to see vulnerabilities for images that are older than 90 days.
What is the most efficient way to achieve this?
Which action is required when creating a new image registry connection that accesses a privately hosted registry?
Which Falcon sensor installation should you use for a Kubernetes endpoint that is hosting container workloads when you have access to the kernel?
You are setting up a Falcon Fusion SOAR workflow to notify your team when any new executable is downloaded to a container and run. You are using a Kubernetes and containers trigger.
Which trigger subcategory and type should you select for this purpose?
You are investigating unassessed images using Falcon Cloud Security.
What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?