Question 6 of 91What is the purpose of this query? Question 7 of 91Refer to the image. Why are there six pending containment events?Question 8 of 91Falcon is generating detections for a malicious file evil.exe with varying filepaths on several hosts as end users attempt to execute the file. Which query can be used to proactively hunt where the file exists prior to the user executing it?Question 9 of 91Which CQL query would output relevant data in tracking USB storage device usage?Question 10 of 91During an investigation you suspect that wget is used broadly to pull commands from C2 servers with public IP addresses. How can you generate an overview of all those addresses?