Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What information is shown in Host Search?

A.

Quarantined Files

B.

Prevention Policies

C.

Intel Reports

D.

Processes and Services

Full Access
Question # 5

What information is provided when using IP Search to look up an IP address?

A.

Both internal and external IPs

B.

Suspicious IP addresses

C.

External IPs only

D.

Internal IPs only

Full Access
Question # 6

You would like to search for ANY process execution that used a file stored in the Recycle Bin on a Windows host. Select the option to complete the following EAM query.

A.

*$Recycle Bin^

B.

*$Recycle Bin*

C.

^$Recycle Bin*

D.

^$Recycle.Bin%^

Full Access
Question # 7

What elements are required to properly execute a Process Timeline?

A.

Agent ID (AID) and Target Process ID

B.

Agent ID (AID) only

C.

Hostname and Local Process ID

D.

Target Process ID only

Full Access
Question # 8

Which of the following is an example of a Falcon threat hunting lead?

A.

A routine threat hunt query showing process executions of single letter filename (e.g., a.exe) from temporary directories

B.

Security appliance logs showing potentially bad traffic to an unknown external IP address

C.

A help desk ticket for a user clicking on a link in an email causing their machine to become unresponsive and have high CPU usage

D.

An external report describing a unique 5 character file extension for ransomware encrypted files

Full Access
Question # 9

Where would an analyst find information about shells spawned by root, Kernel Module loads, and wget/curl usage?

A.

Sensor Health report

B.

Linux Sensor report

C.

Sensor Policy Daily report

D.

Mac Sensor report

Full Access