According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, Reduced Functionality Mode (RFM) is a state where a host’s sensor has limited functionality due to various reasons, such as license expiration, network issues, tampering attempts, etc1. You can find hosts that are in RFM by using the Host Search tool and filtering by Sensor Status = RFM1. You can also view details about why a host is in RFM by clicking on its hostname1.
Question 9
A list of managed and unmanaged neighbors for an endpoint can be found:
Options:
A.
by using Hosts page in the Investigate tool
B.
by reviewing "Groups" in Host Management under the Hosts page
C.
under "Audit" by running Sensor Visibility Exclusions Audit
According to the CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, you can use the Hosts page in the Investigate tool to view information about your endpoints, such as hostname, IP address, OS, sensor version, etc2. You can also see a list of managed and unmanaged neighbors for each endpoint, which are other devices that have communicated with that endpoint over the network2. This can help you identify potential threats or vulnerabilities in your network2.
Pippa
I was so happy to see that almost all the questions on the exam were exactly what I found in their Dumps.
AnastasiaMar 6, 2026
You are right…It was amazing! The Cramkey Dumps were so comprehensive and well-organized, it made studying for the exam a breeze.
Kingsley
Do anyone guide my how these dumps would be helpful for new students like me?
HarisMar 23, 2026
Absolutely! They are highly recommended for anyone looking to pass their certification exam. The dumps are easy to understand and follow, making it easier for you to study and retain the information.
Anaya
I found so many of the same questions on the real exam that I had already seen in the Cramkey Dumps. Thank you so much for making exam so easy for me. I passed it successfully!!!
NinaMar 25, 2026
It's true! I felt so much more confident going into the exam because I had already seen and understood the questions.
Victoria
Hey, guess what? I passed the certification exam! I couldn't have done it without Cramkey Dumps.
IsabelMar 12, 2026
Same here! I was so surprised when I saw that almost all the questions on the exam were exactly what I found in their study materials.
Addison
Want to tell everybody through this platform that I passed my exam with excellent score. All credit goes to Cramkey Exam Dumps.
LibbyMar 7, 2026
That's good to know. I might check it out for my next IT certification exam. Thanks for the info.
Question 10
The function of Machine Learning Exclusions is to___________.
Options:
A.
stop all detections for a specific pattern ID
B.
stop all sensor data collection for the matching path(s)
C.
Stop all Machine Learning Preventions but a detection will still be generated and files will still be uploaded to the CrowdStrike Cloud
D.
stop all ML-based detections and preventions for the matching path(s) and/or stop files from being uploaded to the CrowdStrike Cloud
According to the CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, Machine Learning Exclusions allow you to exclude files or directories from being scanned by CrowdStrike’s machine learning engine, which can reduce false positives and improveperformance2. You can also choose whether to upload the excluded files to the CrowdStrike Cloud or not2.
Question 11
What is an advantage of using the IP Search tool?
Options:
A.
IP searches provide manufacture and timezone data that can not be accessed anywhere else
B.
IP searches allow for multiple comma separated IPv6 addresses as input
C.
IP searches offer shortcuts to launch response actions and network containment on target hosts
D.
IP searches provide host, process, and organizational unit data without the need to write a query
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the IP Search tool allows you to search for an IP address and view a summary of information from Falcon events that contain that IP address1. The summary includes the hostname, sensor ID, OS, country, city, ISP, ASN, geolocation, process name, command line, and organizational unit of the host that communicated with that IP address1. This is an advantage of using the IP Search tool because it provides host, process, and organizational unit data without the need to write a query1.