Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CrowdStrike CCFA-200b Dumps Questions Answers

Page: 1 / 8
Total 100 questions

CrowdStrike Falcon Certification Program Questions and Answers

Question 1

Where can you find hosts that have been offline for ten minutes or longer?

Options:

A.

Host Management

B.

Sensor Coverage Dashboard

C.

Host Groups

Buy Now
Question 2

Your security team is noticing that certain privacy-sensitive information such as the URL, HTTP Header and POST bodies are missing from HTTP related detections. What is likely the cause for this?

Options:

A.

The prevention policy was configured to have an aggressive prevention setting, but only a cautious detection setting

B.

The prevention policy has been configured to redact HTTP detection details

C.

The network perimeter firewall blocked the HTTP connection attempts so there was nothing for Falcon to detect

D.

The prevention policy was never configured to generate HTTP detections

Question 3

You are tasked with creating a group for hosts running Windows 10. What kind of group should you create to make sure all applicable hosts are included in your environment?

Options:

A.

Create a static group with the assignment rule criteria set to OS Type Workstation

B.

Create a dynamic group with the assignment rule criteria set to OS Type Workstation

C.

Create a static group with the assignment rule criteria for OS Version set to Windows 10

D.

Create a dynamic group with the assignment rule criteria for OS Version set to Windows 10

Question 4

What type of information is provided in sensor health report?

Options:

A.

User login history

B.

Local performance metrics

C.

Current operational status

D.

Network traffic patterns

Question 5

Which Windows prevention policy setting monitors contents of shells for execution of malicious content?

Options:

A.

Script-based execution visibility

B.

Suspicious Scripts and Commands

C.

Enhanced exploitation visibility

D.

Additional user mode data visibility

Question 6

Which role allows management of quarantined files?

Options:

A.

Falcon Analyst – Read Only

B.

Detections Exceptions Manager

C.

Falcon Security Lead

D.

Endpoint Manager

Question 7

What are the components that must be allowed to manually install Falcon Sensor on macOS?

Options:

A.

Network filter extension and Full Disk Access only

B.

Full Disk Access and System extension only

C.

Network filter extension and System extension only

D.

System extension, Full Disk Access, and Network filter extension

Question 8

What default user role can manage API credentials?

Options:

A.

Falcon Security Lead

B.

Falcon Administrator

C.

Falcon API Manager

D.

Endpoint Manager

Question 9

What is the recommended approach for managing host groups over time?

Options:

A.

Create separate groups for each department

B.

Create groups based on IP ranges

C.

Maintain multiple overlapping host groups

D.

Minimize the number of groups

Question 10

How are prevention policies assigned to hosts in the Falcon platform?

Options:

A.

Through host group membership

B.

Through direct host assignment

C.

Through IP address ranges

D.

Through manual configuration

Question 11

Your organization wants to monitor the use of remote access software that is currently authorized. The executable is called remote.exe. How would you trigger a detection for review of any process named remote.exe?

Options:

A.

Write an IOA rule to monitor process creation of .*\\remote\.exe

B.

Create an exclusion for remote.exe and set a workflow to email you every time the exclusion is used

C.

Write a scheduled search looking for ProcessRollup2 events for remote.exe

D.

Write an IOC for remote.exe

Question 12

To improve the organization’s security posture, you are designing a Fusion SOAR workflow to generate an alert when critical vulnerabilities are detected by Falcon. When creating a new workflow from scratch, what component of the workflow must be configured first?

Options:

A.

Action

B.

Trigger

C.

Condition

D.

Workflow Name

Question 13

When would the No Action option be assigned to a hash in IOC Management?

Options:

A.

When you want to save the indicator for later action, but do not want to block or allow it at this time

B.

There is no such option as No Action available in the Falcon console

C.

When you want to add the indicator to your allowlist, but not detect it

D.

When you want to add the indicator to your blocklist and show it as a detection

Question 14

Which default user role will allow you to see all analyst session details?

Options:

A.

Falcon Security Lead

B.

Real Time Response - Read-Only Analyst

C.

Falcon Administrator

D.

Real Time Response - Administrator

Question 15

Why would you add IP addresses to a containment policy?

Options:

A.

You want to automate the Network Containment process based on the IP address of a host

B.

A new group of analysts need to be able to place hosts under Network Containment

C.

Your organization has resources that need to be accessible when hosts are network contained

D.

Your organization has additional IP addresses that need to be able to access the Falcon console

Question 16

What is true about User Accounts created by the Falcon Administrator?

Options:

A.

By default, all User Accounts are created with the Falcon Analyst role

B.

All new User Accounts are created using an employee identification number

C.

All User Accounts must start with the domain identifier and number

D.

All User Accounts must be created with an email address from the list of approved domains

Question 17

You want to add an additional layer of security to high-risk Real Time Response commands for your environment. Where do you configure MFA for RTR within the UI?

Options:

A.

General settings

B.

Notifications

C.

Response policies

D.

Containment policy

Question 18

What update policy does a sensor receive when it does not have a group assignment?

Options:

A.

Top precedence policy

B.

Default policy

C.

Auto N-1 policy

Question 19

What is the primary concern with Windows sensors going into Reduced Functionality Mode?

Options:

A.

The sensors are unable to report any of their recorded events

B.

The sensors do not have full visibility into all events occurring on the host

C.

The hosts have been powered off or otherwise cannot communicate with the Falcon cloud

D.

The operating systems on these hosts have crashed

Question 20

What is the highest level of protection for a prevention policy?

Options:

A.

Phase 1

B.

Phase 2

C.

Phase 3

Question 21

When troubleshooting a Windows sensor that appears to be installed but is not running, what should be verified to ensure they are installed and running?

Options:

A.

LMHosts and Windows Base Filtering Engine

B.

Windows firewall and internet connectivity to the CrowdStrike cloud

C.

Network Store Interface and Network List Service

Question 22

When using Microsoft Windows, what command verifies that a Falcon Sensor is running?

Options:

A.

cswindiag.exe -status

B.

sc.exe query csagent

C.

netstat.exe -f

D.

sc.exe query falcon

Question 23

What are the three required parts of a Fusion SOAR workflow condition?

Options:

A.

Operator, value, and source

B.

Alert, action, and schedule

C.

Trigger, parameter, and alert

D.

Parameter, operator, and value

Question 24

You need to look up a Red Hat Enterprise Linux (RHEL) system in Host Management. What filter would apply?

Options:

A.

Platform

B.

OS version

C.

Type

D.

OU

Question 25

Excluding mobile devices, what kind of hosts can be contained in Falcon?

Options:

A.

Windows and MacOS hosts running the Falcon sensor

B.

Windows and Linux hosts running the Falcon sensor

C.

Windows, Linux, and container hosts running the Falcon sensor

D.

Windows, Linux, and MacOS hosts running the Falcon sensor

Question 26

Your leadership wants controls in place for immediate action on any Overwatch detections. What should you do to ensure the host is contained quickly and notifies the appropriate staff?

Options:

A.

Create a Fusion SOAR workflow to contain the host and email the Overwatch team

B.

Create a Fusion SOAR workflow to create a detection for Overwatch and email the SOC team

C.

Create a Fusion SOAR workflow to trigger on an Overwatch detection and set it to block the detection

D.

Create a Fusion SOAR workflow using the Overwatch playbook to contain the host and email the SOC team

Question 27

What page provides a count of new Reduced Functionality Mode (RFM) sensors by day?

Options:

A.

Hosts Overview

B.

Sensor Health

C.

Activity Overview

D.

Support and resources

Question 28

A host has been Network contained with Falcon and you have been asked to update the Operating System with zero day patches. You have tried using your patch update systems for this task, but the jobs fail. Which configuration steps in the Falcon UI will allow these activities?

Options:

A.

Create a Containment Policy that allow lists the specific IP addresses of your patch management tools

B.

Create a Containment Policy that allow lists the Fully Qualified name of your patch management tools

C.

Remove Host containment and update the host with all patches

D.

Create a Firewall Policy that allow lists your patch management tools

Question 29

You are tasked with creating a “Workstations” host group to encompass all workstations in your environment. Which dynamic grouping criteria will most efficiently accomplish this task?

Options:

A.

OU Workstation

B.

Grouping Tags Workstation

C.

Type: Workstation

D.

Platform Windows

Question 30

You are assigning sensor group tags during installation. What is the maximum allowed length of all tags?

Options:

A.

237 characters

B.

256 characters

C.

50 characters

D.

100 characters

Page: 1 / 8
Total 100 questions