Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CrowdStrike CCFA-200b CrowdStrike Falcon Certification Program Exam Practice Test

Page: 1 / 10
Total 100 questions

CrowdStrike Falcon Certification Program Questions and Answers

Question 1

When searching for a host network address, which IP notation should be used?

Options:

A.

10 10105,1010108

B.

1010102,10 10107

C.

192.168.5.1/24

D.

192 168 5 1-100

Question 2

In order to quarantine files on the host, what prevention policy settings must be enabled?

Options:

A.

Malware Protection and Windows Anti-Malware Execution Blocking

B.

Next-Gen Antivirus Prevention sliders and “Quarantine & Security Center Registration”

C.

Malware Protection and Custom Execution Blocking

D.

Behavior-Based Threat Prevention sliders and Advanced Remediation Actions

Question 3

You are tasked with creating a “Workstations” host group to encompass all workstations in your environment. Which dynamic grouping criteria will most efficiently accomplish this task?

Options:

A.

OU Workstation

B.

Grouping Tags Workstation

C.

Type: Workstation

D.

Platform Windows

Question 4

Your organization wants to monitor the use of remote access software that is currently authorized. The executable is called remote.exe. How would you trigger a detection for review of any process named remote.exe?

Options:

A.

Write an IOA rule to monitor process creation of .*\\remote\.exe

B.

Create an exclusion for remote.exe and set a workflow to email you every time the exclusion is used

C.

Write a scheduled search looking for ProcessRollup2 events for remote.exe

D.

Write an IOC for remote.exe

Question 5

Which statement best describes user permissions in Falcon?

Options:

A.

Custom user role permission sets can be shared with all CrowdStrike customers globally

B.

Users can only have predefined default roles assigned to them before using a custom role

C.

User permissions can be defined by default or custom roles as needed

D.

Each Falcon permission needs to be selected when the user account is created

Question 6

How are prevention policies assigned to hosts in the Falcon platform?

Options:

A.

Through host group membership

B.

Through direct host assignment

C.

Through IP address ranges

D.

Through manual configuration

Question 7

What information can be found in the Real Time Response (RTR) Audit Log?

Options:

A.

IP Address, Prevention Policy, recent detections, and host group assignment

B.

Session end time, command return results, and file activity

C.

Session start time, duration, user, hostname, commands used, and retrieved files

D.

Real Time Response (RTR) information is not collected via audit logs

Question 8

After attempting to uninstall the Falcon sensor from a Windows endpoint, the process appears stuck. What troubleshooting step should be taken?

Options:

A.

Reboot the system immediately

B.

Force stop the sensor service in Task Manager

C.

Delete the sensor directory manually

D.

Check the CrowdStrike Windows Sensor log file for errors

Question 9

When an API client is created, what two pieces of information must be generated as a pair to successfully identify and validate your API integrations?

Options:

A.

Customer ID and Integration ID

B.

Client ID and Secret

C.

Customer ID and Secret

D.

Client ID and OAuth2 ID

Question 10

Why would you add IP addresses to a containment policy?

Options:

A.

You want to automate the Network Containment process based on the IP address of a host

B.

A new group of analysts need to be able to place hosts under Network Containment

C.

Your organization has resources that need to be accessible when hosts are network contained

D.

Your organization has additional IP addresses that need to be able to access the Falcon console

Question 11

What is an example of when you will need to refer to your Customer ID+ Checksum (CIDC)?

Options:

A.

When uninstalling a Falcon Sensor

B.

When you need to find a specific host in Host Management

C.

When defining host group assignment criteria

D.

When installing a new Falcon Sensor

Question 12

You need to look up a Red Hat Enterprise Linux (RHEL) system in Host Management. What filter would apply?

Options:

A.

Platform

B.

OS version

C.

Type

D.

OU

Question 13

What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?

Options:

A.

Host Modification Protection

B.

System Configuration Protection

C.

Sensor Tampering Protection

D.

Sensor Modification Protection

Question 14

What policy setting should be selected for a new host when it has an existing antivirus?

Options:

A.

Extra Aggressive Level ML

B.

Aggressive Level ML

C.

Moderate Level ML

D.

Cautious Level ML

Question 15

What are the components that must be allowed to manually install Falcon Sensor on macOS?

Options:

A.

Network filter extension and Full Disk Access only

B.

Full Disk Access and System extension only

C.

Network filter extension and System extension only

D.

System extension, Full Disk Access, and Network filter extension

Question 16

What type of information is provided in sensor health report?

Options:

A.

User login history

B.

Local performance metrics

C.

Current operational status

D.

Network traffic patterns

Question 17

Which report in Falcon can be used to determine the volume of blocked activity at a different prevention policy setting?

Options:

A.

Falcon Prevention Policy Debug

B.

Machine Learning Prevention Monitoring

C.

Prevention Policy Audit Trail

Question 18

Your development team is working on a new enterprise application, but Falcon starts creating alerts during testing. The alert points to “C:\Users\Bob\DevCode\felix.dll”. In the detection, you see that it is triggering only on a specific Falcon IOA. What would be the best course of action for this situation?

Options:

A.

Create an IOA exclusion for “C:\Users\Bob\DevCode\felix.dll”

B.

Create a Custom IOC and set it to “Allow” for “C:\Users\Bob\DevCode\felix.dll”

C.

Manually turn off the built-in IOA through prevention policies

D.

Create a sensor visibility exclusion for “C:\Users\Bob\DevCode\felix.dll”

Question 19

During a Windows system investigation via Real Time Response, an RTR Active Responder is unable to execute a custom PowerShell script for finding specific system artifacts. What is likely restricting the responder from executing the PowerShell script?

Options:

A.

Put-and-Run is not enabled in the response policy

B.

Custom Scripts is not enabled in the response policy

C.

Script-Based Execution Monitoring is not enabled in the prevention policy

D.

The responder requires the RTR Administrator role

Question 20

An inactive host does not contact the Falcon cloud. What is the default number of days after which it is automatically removed from the Host Management page?

Options:

A.

30 Days

B.

90 Days

C.

45 Days

Question 21

You are attempting to install the Falcon sensor on a host with a slow internet connection, and the installation fails after 20 minutes. What parameter can be used to override the 20-minute default provisioning window?

Options:

A.

Timeout=30

B.

ProvNoWait=1

C.

Timeout=0

D.

DelayedStart=1

Question 22

What action should you take to securely allow operating system update processes to occur during network containment?

Options:

A.

Ensure all internal network IPs are allowed

B.

Add IPs of update sources to the Containment policy

C.

Add sources to the Host Firewall policy

D.

Remove network containment to allow access

Question 23

In order to receive the most stable sensor updates, what level of automatic sensor updates should be applied to a host?

Options:

A.

Auto-N-2

B.

Auto-N-1

C.

Pinned sensor version

D.

Auto-Latest

Question 24

What prevention policy settings must be enabled to quarantine files on the host?

Options:

A.

Quarantine Files; Windows Anti-Malware Execution Blocking

B.

Malware Protection; Custom Execution Blocking

C.

Next-Gen Antivirus Prevention sliders; Quarantine & Security Center Registration

D.

Advanced Remediation Actions; Quarantine level set to Aggressive

Question 25

Which default user role will allow you to see all analyst session details?

Options:

A.

Falcon Security Lead

B.

Real Time Response - Read-Only Analyst

C.

Falcon Administrator

D.

Real Time Response - Administrator

Question 26

After successfully installing Falcon on a new employee’s laptop, you notice that the machine is assigned the default prevention policy instead of the custom prevention policy you created. You verify that the Falcon sensor is functioning properly, and you confirm that the custom policy is enabled and successfully running on more than 1,000 other Falcon hosts. What is the likely cause of this issue?

Options:

A.

Falcon requires a 24-hour waiting period to apply custom policies to newly installed hosts

B.

A host-based firewall rule is preventing the custom policy from applying successfully

C.

The laptop is not a member of a host group assigned to the custom policy

D.

A prompt to apply the new prevention policy was manually declined

Question 27

Your leadership wants controls in place for immediate action on any OverWatch detections. What should you do to ensure the host is contained quickly and notifies the appropriate staff?

Options:

A.

Create a Fusion SOAR workflow using the OverWatch playbook to contain the host and email the SOC team

B.

Create a Fusion SOAR workflow to contain the host and email the OverWatch team

C.

Create a Fusion SOAR workflow to trigger on an OverWatch detection and set it to block the detection

D.

Create a Fusion SOAR workflow to create a detection for OverWatch and email the SOC team

Question 28

What update policy does a sensor receive when it does not have a group assignment?

Options:

A.

Top precedence policy

B.

Default policy

C.

Auto N-1 policy

Question 29

Which ML exclusion pattern would be the most accurate for all .exe binaries in “C:\Program Files\Software\”, including any subfolders of Software?

Options:

A.

Program Files\Software* .exe

B.

Program Files\Software*.exe

C.

Program Files\Software* *.exe

D.

***.exe

Question 30

What happens when a Falcon Sensor on a Linux host enters Reduced Functionality Mode?

Options:

A.

RFM sensors on Linux hosts only send detection information to the Falcon Console. Event processing is disabled

B.

RFM sensors on Linux hosts stop processing both events and detections. Sensors send basic status information to the Falcon Console

C.

RFM sensors on Linux hosts continue to process events and detections for existing policies but cannot get policy updates from the Falcon Console

D.

RFM sensors on Linux hosts stop processing events and detections but continue to send log data into Falcon

Page: 1 / 10
Total 100 questions