What are three valid states for the state of a port under the Network Events dashboard?
A Open, Connect, and Closed
B Listen, Reject, and Connect
C Connect, Accept, and Listen
D Accept, Connect, and Reject
In Falcon Cloud Security Network Events, port states reflect how network connections are established and handled at runtime. The platform uses standardized connection state terminology to help analysts understand traffic behavior and intent.
The three valid port states are:
Connect: Indicates an outbound connection attempt initiated by a process or container.
Accept: Represents an inbound connection that was accepted by a listening process.
Listen: Shows that a process is actively listening on a port for incoming connections.
These states provide crucial context for detecting suspicious behavior such as unauthorized listeners, unexpected inbound access, or abnormal outbound communications. Other options include terms not used by Falcon to define port state semantics within Network Events.
Therefore, Connect, Accept, and Listen is the correct answer.
Reveal Answer
Next Question
Reveal Answer
Next Question
What are the three Image properties that can be selected when editing a Cloud Group?
A Tag, Name, and Registry
B Name, Repository, and Registry
C Repository, Tag, and Name
D Registry, Repository, and Tag
In CrowdStrike Falcon Cloud Security, Cloud Groups are used to logically group container images so that policies, assessments, and controls can be applied consistently across workloads. When editing or defining a Cloud Group for container images, Falcon allows administrators to select specific image properties to precisely target the desired scope.
The three supported image properties are Registry, Repository, and Tag.
Registry identifies where the container image is hosted, such as Amazon ECR, Azure Container Registry, or Docker Hub.
Repository defines the image namespace or project within the registry.
Tag specifies the image version or variant (for example, latest, v1.2.3, or prod).
Using these three properties together enables highly granular targeting. For example, security teams can apply stricter policies only to production-tagged images from a specific registry and repository, while allowing more flexibility for development images.
Options that include Name are incorrect because CrowdStrike does not use a standalone ''image name'' field when defining Cloud Group image criteria. Instead, image identity is derived from the combination of registry, repository, and tag.
Therefore, the correct and fully supported selection is Registry, Repository, and Tag, which aligns with CrowdStrike Falcon Cloud Security configuration and documentation.
Reveal Answer
Next Question
Reveal Answer
Next Question
What is one purpose of the CrowdStrike Kubernetes Admission Controller?
A Forwards Kubernetes event logs to CrowdStrike NG SIEM
B Provides security visibility into EKS, AKS, and self-managed clusters
C Monitors and enforces security policies in any containerized environment
The CrowdStrike Kubernetes Admission Controller is a pre-runtime security control designed to enforce security policies before workloads are allowed to run in a Kubernetes environment. Its primary purpose is to monitor and enforce security policies in any containerized environment by intercepting Kubernetes API requests at admission time.
When a deployment, pod, or container is submitted to the Kubernetes API server, the Admission Controller evaluates the request against Falcon Cloud Security policies. These policies can include rules related to image risk posture, vulnerabilities, malware presence, secrets, or compliance violations. If an image violates defined policies, the Admission Controller can block the deployment, preventing insecure or non-compliant workloads from entering the cluster.
This capability is critical for implementing a shift-left security model, ensuring that threats are stopped before runtime, rather than detected after execution. While Falcon also provides runtime protection and visibility across managed Kubernetes platforms such as EKS and AKS, those capabilities are not the primary function of the Admission Controller itself.
The Admission Controller does not forward Kubernetes logs to SIEM platforms; instead, it acts as an enforcement gate. Therefore, the correct answer is Monitors and enforces security policies in any containerized environment.
Reveal Answer
Next Question
Reveal Answer
Next Question
Reveal Answer
Next Question