What criteria can you use to create exclusions for cloud scans?
A Account
B Region
C Service
D Tag
In CrowdStrike Falcon Cloud Security, exclusions for cloud scans are designed to be precise and scalable so that organizations can safely reduce noise without weakening overall security coverage. According to CrowdStrike best practices, tags are the recommended and supported criterion for creating cloud scan exclusions.
Tags are metadata labels applied to cloud resources (such as AWS accounts, instances, or services) and are commonly used for ownership, environment classification (for example, dev, test, or prod), or application grouping. By using tags as exclusion criteria, security teams can dynamically control which resources are excluded from scans without relying on static identifiers. This is especially important in cloud environments where resources are frequently created, modified, or terminated.
Exclusions based on accounts, regions, or services are broader in scope and can unintentionally exclude large portions of the environment, increasing the risk of blind spots. Tag-based exclusions allow CrowdStrike Falcon to maintain least-privilege security principles by excluding only explicitly labeled resources.
Because Falcon continuously evaluates cloud resources, tag-based exclusions automatically apply to newly created assets that inherit the same tag, ensuring consistent policy enforcement. For these reasons, CrowdStrike documentation and operational guidance identify Tag as the correct and most effective criterion for creating cloud scan exclusions.
Reveal Answer
Next Question
Reveal Answer
Next Question
What is a primary function of the Containers and Images Compliance dashboard in CrowdStrike's Cloud Security platform?
A Provides a visual summary of compliance across containers and images
B Tracks the network performance of containers and provides detailed network usage data
C Allows users to automatically patch non-compliant containers and images
D Displays the list of all containers that are unsupported by Falcon Cloud Security with Containers
The Containers and Images Compliance dashboard in Falcon Cloud Security is designed to give security and DevOps teams a visual, aggregated view of compliance posture across container images and running containers.
This dashboard summarizes compliance status against benchmarks such as CIS, organizational policies, and security best practices. It highlights compliant versus non-compliant images and containers, severity distribution, and trending risk, enabling teams to quickly assess overall posture and prioritize remediation.
The dashboard does not perform network monitoring, automatic patching, or unsupported container enumeration. Those functions are handled by other Falcon modules or operational workflows.
Therefore, its primary function is to provide a visual summary of compliance across containers and images, making Option A correct.
Reveal Answer
Next Question
You need to register one AWS account as part of a deployment of Falcon Cloud Security. You decide to complete the registration process in the Falcon UI.
What will be utilized during this process if you choose the recommended method to register an individual AWS account?
A AWS Config
B A Terraform script
C AWS CloudFormation
D A Bash script
When registering an individual AWS account in CrowdStrike Falcon Cloud Security using the Falcon UI, the recommended and supported method is AWS CloudFormation. CrowdStrike provides a prebuilt CloudFormation template that automates the creation of required AWS resources, including IAM roles, permissions, and trust relationships needed for secure, read-only API access.
Using CloudFormation ensures the deployment is consistent, auditable, and aligned with AWS best practices. It minimizes human error by automatically configuring the correct permissions required for Falcon to collect configuration, identity, and resource metadata from AWS. This method also simplifies lifecycle management---resources can be updated or removed cleanly by managing the CloudFormation stack.
Other options are not recommended for this use case. AWS Config is a native AWS compliance service but does not handle Falcon onboarding. Terraform scripts may be used in advanced or large-scale automation scenarios, but they are not the default or recommended approach for single-account registration in the Falcon UI. Bash scripts lack governance, validation, and repeatability.
Therefore, when registering a single AWS account through the Falcon console, AWS CloudFormation is the correct and CrowdStrike-recommended method.
Reveal Answer
Next Question
Reveal Answer
Next Question
The internal audit team is preparing for an internal review. You have been asked to provide a list of configuration policy breaches against the NIST benchmark.
Where can you access this list?
A Export Cloud Posture -- Cloud indicators of attack
B Export Cloud Posture -- Indicators of misconfiguration
C Export Cloud Posture -- Remediation status
D Export Cloud Posture -- Cloud Posture dashboard
In CrowdStrike Falcon Cloud Security, configuration policy breaches aligned to regulatory and security frameworks such as NIST are tracked as Indicators of Misconfiguration (IOMs). These findings represent deviations from best-practice configurations and compliance benchmarks.
To provide an auditable list of NIST-related configuration violations, the correct location is Export Cloud Posture -- Indicators of misconfiguration. This export includes detailed records of misconfigured resources, associated benchmarks (NIST, CIS, etc.), affected cloud accounts, severity, and remediation guidance. It is specifically designed to support internal and external audit requirements.
Cloud Indicators of Attack focus on threat activity, not compliance. Remediation status reports focus on fix progress rather than raw policy violations. The Cloud Posture dashboard provides a high-level summary but does not deliver the detailed, exportable list required for audits.
Therefore, Export Cloud Posture -- Indicators of misconfiguration is the correct and documented source.
Reveal Answer
Next Question
What are three valid states for the state of a port under the Network Events dashboard?
A Open, Connect, and Closed
B Listen, Reject, and Connect
C Connect, Accept, and Listen
D Accept, Connect, and Reject
In Falcon Cloud Security Network Events, port states reflect how network connections are established and handled at runtime. The platform uses standardized connection state terminology to help analysts understand traffic behavior and intent.
The three valid port states are:
Connect: Indicates an outbound connection attempt initiated by a process or container.
Accept: Represents an inbound connection that was accepted by a listening process.
Listen: Shows that a process is actively listening on a port for incoming connections.
These states provide crucial context for detecting suspicious behavior such as unauthorized listeners, unexpected inbound access, or abnormal outbound communications. Other options include terms not used by Falcon to define port state semantics within Network Events.
Therefore, Connect, Accept, and Listen is the correct answer.
Reveal Answer
Next Question