Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CrowdStrike Exam CCFR-201 Topic 1 Question 10 Discussion

Actual exam question for CrowdStrike's CCFR-201 exam
Question #: 10
Topic #: 1
[All CCFR-201 Questions]

Contribute your Thoughts:

Claudia
1 months ago
Ah, the joys of cybersecurity exams. Where the answers are made up and the points don't matter!
upvoted 0 times
...
Brett
1 months ago
I bet the answer is C. After all, who wants their sensor to be monitoring that trusted file path, am I right? Gotta keep that cloud nice and clean!
upvoted 0 times
Michal
14 days ago
A) It excludes host information from Detections and Incidents generated within that file path
upvoted 0 times
...
...
Avery
1 months ago
Ah, I've heard about this before. It excludes host information from Detections and Incidents generated within that file path location, right?
upvoted 0 times
Dante
2 days ago
So it's a way to limit monitoring and collection for trusted file paths.
upvoted 0 times
...
Ilene
10 days ago
It also disables detection generation from that path, but the sensor can still perform prevention actions.
upvoted 0 times
...
Jamal
17 days ago
Yes, that's correct. It excludes host information from Detections and Incidents within that file path.
upvoted 0 times
...
...
Maile
1 months ago
Wait, does it disable detection generation from that path but still allow prevention actions? That seems like an interesting option.
upvoted 0 times
...
Kimberely
2 months ago
Hmm, I was thinking it prevents file uploads to the CrowdStrike cloud from that file path. But I could be wrong.
upvoted 0 times
Alishia
5 days ago
User 3: It actually excludes host information from Detections and Incidents generated within that file path location.
upvoted 0 times
...
Zita
20 days ago
User 2: I believe it disables detection generation from that path, but the sensor can still perform prevention actions.
upvoted 0 times
...
Timmy
1 months ago
User 1: I think it excludes sensor monitoring and event collection for the trusted file path.
upvoted 0 times
...
...
Hortencia
2 months ago
I'm pretty sure it excludes sensor monitoring and event collection for the trusted file path. That sounds like the correct answer to me.
upvoted 0 times
Serita
1 months ago
Yes, that's correct. It excludes sensor monitoring and event collection for the trusted file path.
upvoted 0 times
...
Lashawn
2 months ago
I think you're right, it does exclude sensor monitoring and event collection for the trusted file path.
upvoted 0 times
...
...
Dewitt
2 months ago
But wouldn't D) It disables detection generation from that path, however the sensor can still perform prevention actions, also make sense?
upvoted 0 times
...
Yuonne
2 months ago
I agree with Samuel, because excluding sensor monitoring would mean no detection or incident generation.
upvoted 0 times
...
Samuel
3 months ago
I think the answer is C) It excludes sensor monitoring and event collection for the trusted file path.
upvoted 0 times
...

Save Cancel