How does Identity Protection extend the capabilities of existing multi-factor authentication (MFA)?
Which menu option isNOTincluded in Falcon Identity Threat Detection (ITD)?
To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:
How should an organization address the domain risk score found in the Domain Security Overview page?
The NIST SP 800-207 framework for Zero Trust Architecture defines validation and authentication standards for users in which network locations?
How does CrowdStrike Falcon Identity Protection help customers identify different types of accounts in their domain?
Where would a Falcon administrator enable authentication traffic inspection (ATI) for Domain Controllers?
Which of the following Falcon rolesCANNOTenable and disable policy rules?
Which of the following would cause an identity-based incident type to change?
Which of the following best describes how Policy Group and Policy Rule precedence works?
Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?
When creating an API key, which scope should be selected to retrieve Identity Protection detection and incident information?
Within Domain Security Overview, whatGoalincorporates all risks into one security assessment report?
Can a specific detection be excluded altogether or just per entity?
Which of the following isNOTan available Goal within the Domain Security Overview?
What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?
Which of the following actions willNOThelp to decrease a domain risk score?