Question 6 of 121

Exam ccis: Image 1

Given the detection exclusion shown above, which answer CORRECT describes how this would work regarding the “Suspicious protocol implementation (pass the hash)” detection?

Answer

Suggested Answer

The suggested answer is B.

Question 7 of 121

Exam ccis: Image 1

Given information from the Falcon Identity Protection detection shown in the figure above, which of the following responses is TRUE?

Answer

Suggested Answer

The suggested answer is B.

Question 8 of 121

Exam ccis: Image 1

What needs to be added to the following Fusion Workflow in order to monitor entities related to these particular endpoint detections?

Answer

Suggested Answer

The suggested answer is C.

Question 9 of 121

Exam ccis: Image 1

Which of the following are not included within the three-dot menu on Identity-based Detections?

Answer

Suggested Answer

The suggested answer is C.

Question 10 of 121

The Risk Matrix shows the risks rated by two parameters, what are they?

Exam ccis: Image 1
Answer

Suggested Answer

The suggested answer is A.