What is the recommended method to block a specific CVE for 14 days when creating an Image assessment policy exclusion?
The internal audit team is preparing for an internal review. You have been asked to provide a list of configuration policy breaches against the NIST benchmark.
Where can you access this list?
You have misconfigurations left undone in your AWS environment. This has caused you to rely on a third party or your limited internal desktop security team that lacks cloud consciousness.
What Cloud Security Posture Management setting can you set up to help your security team save time?
What Falcon Sensor could be used to provide security for an AWS EKS cluster running on Amazon Linux 2–based EC2 instances, including container-level visibility?
What allows you to block a specific vulnerability for a user-specified amount of time when creating an image assessment policy exclusion?
There is a valid sensor update policy for all Linux hosts that is set to n-2. Some of the hosts have not updated their sensor version.
What is the reason for this situation?
You are concerned about an overprivileged cloud identity.
What steps should you take to identify issues with the account's permissions?
You no longer want to see vulnerabilities for images that are older than 90 days.
What is the most efficient way to achieve this?
You are setting up a Falcon Fusion SOAR workflow to notify your team when any new executable is downloaded to a container and run. You are using a Kubernetes and containers trigger.
Which trigger subcategory and type should you select for this purpose?
You want to block privileged containers from being executed in your Kubernetes cluster.
What sensor type should you deploy?