What basic configuration fields are typically required for cloud Multi-Factor Authentication (MFA) connectors?
The NIST SP 800-207 framework for Zero Trust Architecture defines validation and authentication standards for users in which network locations?
What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?
By using compromised credentials, threat actors are able to bypass theExecutionphase of the MITRE ATT&CK framework and move directly into:
What setting can be switched under the Domain Security Overview for each Active Directory domain and/or Azure tenant?
Which CrowdStrike documentation category would you search to find GraphQL examples?
The events are excluded by default while Low, Medium, and High detections are visible.
Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?
Which entity tab will show an administrator how to lower the account's risk score?
Which of the following IDaaS connectors will allow Identity to ingest cloud activity along with applying SSO Policy?
How should a user be classified if one requires observation for potential risk to the business?
The configuration of the Azure AD (Entra ID) Identity-as-a-Service connector requires which three pieces of information?
Which of the following best describes how Policy Group and Policy Rule precedence works?