Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CrowdStrike CCSE-204 Dumps Questions Answers

Page: 1 / 4
Total 62 questions

CrowdStrike Certified SIEM Engineer Questions and Answers

Question 1

Which function is most appropriate for extracting fields from logs formatted as key=value pairs?

Options:

A.

parseJson()

B.

kvParse()

C.

parseCsv()

D.

parseXml()

Buy Now
Question 2

Which command helps visualize in real time whether sources and sinks are working properly in the Log Collector?

Options:

A.

journalctl -u logscale-collector

B.

logscale-collector monitor

C.

logscale-collector check

D.

logscale-collector --status

Question 3

How can you enable internal logging for a specific Falcon Log Collector instance from the Fleet view?

Options:

A.

Reinstall the collector with logging enabled

B.

Edit the local configuration file

C.

Select “Manage Internal Logging” from the menu

D.

Restart the collector service with the flag “Manage Internal Logging”

Question 4

As a Next-Gen SIEM Engineer, you are responsible for managing and tuning correlation rules to improve the detection of potential security incidents. One of your correlation rules is designed to detect multiple failed login attempts that are followed by a successful login within a short time frame.

Which step would you take to tune this correlation rule to reduce false positives while maintaining its effectiveness?

Options:

A.

Increase the time window for detecting multiple failed login attempts to capture more data

B.

Add a condition to exclude known trusted IP addresses from triggering the rule

C.

Decrease the threshold for the number of failed login attempts required to trigger the rule

D.

Remove the condition for a successful login to simplify the rule

Question 5

What is the primary benefit of utilizing Next-Gen SIEM’s built-in dashboards?

Options:

A.

Direct access to raw log data

B.

Custom queries for specific events

C.

Quick insights without manual setup

D.

Capability to modify dashboard source code

Question 6

A correlation rule is generating a high volume of detections. You have been asked to temporarily deactivate it so your team can investigate.

What will happen to previously generated detections while the rule is in a deactivated state?

Options:

A.

They will not be impacted and will remain within the console

B.

Their status will change to closed and tagged as true positives in the console

C.

Their status will change to closed and tagged as false positives in the console

D.

They will be immediately deleted from the console

Question 7

Review the log sample below:

What type of parser should be used to extract fields and values from this log?

Options:

A.

XML

B.

CSV

C.

JSON

D.

Key-Value

Question 8

What should you do with a field that is not CPS-compliant when adding it to a parser?

Options:

A.

Remove the field from the parser output

B.

Leave the field unchanged

C.

Convert the field to ECS format

D.

Prefix the field with Vendor

Question 9

What are the four required CPS-compliant Event parser tags?

Options:

A.

event.category

event.kind

event.module

event.outcome

B.

event.category

event.dataset

event.kind

event.outcome

C.

event.dataset

event.kind

event.module

event.outcome

Question 10

Which Falcon LogScale Collector output format would you use if your downstream SIEM requires raw nested event data?

Options:

A.

Syslog

B.

CEF

C.

JSON

D.

LEEF

Question 11

You notice that the format of incoming logs suddenly changes from JSON format to key-value pairs during log collection.

What action would you take to parse the data correctly?

Options:

A.

Use a multi-source configuration with different parsers per source

B.

Switch to fleet mode and monitor the logs

C.

Restart the log collector in debug mode

D.

Disable parsing entirely

Question 12

Which three System alerts are enabled by default in Next-Gen SIEM for third-party connectors?

Options:

A.

Alert if connector receives no data in 24 hours

Alert if connector is disconnected

Resolve alerts within 30 days

B.

Alert if daily data ingestion limit exceeded

Alert if monthly data ingestion limit is exceeded

Resolve alerts within 30 days

C.

Alert if connector is disconnected

Alert if daily data ingestion limit exceeded

Alert if monthly data ingestion limit is exceeded

D.

Alert if connector receives no data in 24 hours

Alert if daily data ingestion limit exceeded

Alert if monthly data ingestion limit is exceeded

Question 13

You are reviewing a lookup file to determine whether an event was successfully parsed during ingestion.

Which metadata field indicates the event’s parsing status?

Options:

A.

@ingesttimestamp

B.

@rawstring

C.

@error_msg

D.

@event_parsed

Question 14

You are performing a search query using data from the Falcon Sensor and third-party data connectors.

Which Advanced Event Search data source should you choose?

Options:

A.

All

B.

Falcon

C.

Third-party

D.

Custom

Question 15

Which field is compliant with CrowdStrike Parsing Standard (CPS)?

Options:

A.

Parser.type

B.

#event.dataset

C.

#event.trigger

D.

Parser.name

Question 16

You find a Falcon Log Collector instance on a Linux system that is not connected to Fleet Management.

What command would you use to enroll the Falcon Log Collector?

Options:

A.

"C:\Program Files (x86)\CrowdStrike\Humio Log Collector\humio-log-collector.exe" enroll < TOKEN >

B.

sudo logscale-collector enroll < TOKEN >

C.

sudo humio-log-collector enroll < TOKEN >

D.

sudo humio-log-collector --token < TOKEN > enroll

Question 17

Which Falcon LogScale Collector mode keeps the log source configuration stored locally on the collector host instead of centrally in Fleet Management?

Options:

A.

full

B.

central

C.

localConfig

D.

collectorOnly

Page: 1 / 4
Total 62 questions