Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CrowdStrike CCFA-200b Dumps

Page: 1 / 10
Total 100 questions

CrowdStrike Falcon Certification Program Questions and Answers

Question 1

How are sensor updates managed and enforced across multiple hosts in Falcon?

Options:

A.

Prevention policies assigned to host groups

B.

Manual updates on each host

C.

Sensor update policies assigned to host groups

D.

Direct installation

Question 2

Your incident responder team is migrating existing workflows into Fusion SOAR workflows so that they execute natively in Falcon. The workflow imports are failing. What format must the workflows be in order to successfully import them into Fusion SOAR?

Options:

A.

YAML

B.

CSV

C.

SOAR

D.

JSON

Question 3

Where can you find a list of hosts that have not communicated with the CrowdStrike Cloud?

Options:

A.

Host Groups

B.

Inactive Sensors

C.

Activity Dashboard

D.

Sensor Report

Question 4

Where can you find hosts that have been offline for ten minutes or longer?

Options:

A.

Host Management

B.

Sensor Coverage Dashboard

C.

Host Groups

Question 5

Which statement best describes user permissions in Falcon?

Options:

A.

Custom user role permission sets can be shared with all CrowdStrike customers globally

B.

Users can only have predefined default roles assigned to them before using a custom role

C.

User permissions can be defined by default or custom roles as needed

D.

Each Falcon permission needs to be selected when the user account is created

Question 6

Which Windows prevention policy setting monitors contents of shells for execution of malicious content?

Options:

A.

Script-based execution visibility

B.

Suspicious Scripts and Commands

C.

Enhanced exploitation visibility

D.

Additional user mode data visibility

Question 7

What happens when a Falcon Sensor on a Linux host enters Reduced Functionality Mode?

Options:

A.

RFM sensors on Linux hosts only send detection information to the Falcon Console. Event processing is disabled

B.

RFM sensors on Linux hosts stop processing both events and detections. Sensors send basic status information to the Falcon Console

C.

RFM sensors on Linux hosts continue to process events and detections for existing policies but cannot get policy updates from the Falcon Console

D.

RFM sensors on Linux hosts stop processing events and detections but continue to send log data into Falcon

Question 8

You have 100 hashes that have been prohibited by management and need to be blocked within your organization. Using Falcon, what is the best way to accomplish this?

Options:

A.

Navigate to Configure > IOC Management. Add a custom IOC. Add the list of hashes. Set the action to Block. Verify the prevention policy includes Custom Blocking under Execution Blocking.

B.

Navigate to Configure > Prevention policies. Add an IOC Policy. Add the list of hashes as CSV file. Set the action to Block. Verify Custom Execution Blocking is active.

C.

Navigate to Configure > IOC Management. Add a custom Prevention Policy. Add the list of hashes. Set the action to Block. Verify the policy includes Custom Execution Blocking.

D.

Navigate to Configure > Prevention policies. Add an IOC Policy. Add the list of hashes as CSV file. Set the action to Block and Alert. Verify Custom Blocking inside Execution Blocking is active.

Question 9

Which role allows a Falcon user to create Real Time Response Custom Scripts?

Options:

A.

Real Time Responder – Active Responder

B.

Real Time Responder – Administrator

C.

Real Time Responder – Read Only Analyst

D.

Real Time Responder – Script Developer

Question 10

What is true about the Default Sensor Policy?

Options:

A.

It tests the sensor configuration settings before deployment

B.

It is applied automatically if no other Sensor Policies are applied

C.

It can be used to reset all sensor settings to Default

D.

It is a mechanism to deploy the oldest supported version of the Falcon Sensor

Question 11

What policy setting should be selected for a new host when it has an existing antivirus?

Options:

A.

Extra Aggressive Level ML

B.

Aggressive Level ML

C.

Moderate Level ML

D.

Cautious Level ML

Question 12

Which setting inside the Sensor Update Policy prevents unauthorized uninstallation?

Options:

A.

Installation and Maintenance Protection

B.

Sensor Version Control Protection

C.

Uninstall and Maintenance Protection

D.

Update and Management Protection

Question 13

When using Microsoft Windows, what command verifies that a Falcon Sensor is running?

Options:

A.

cswindiag.exe -status

B.

sc.exe query csagent

C.

netstat.exe -f

D.

sc.exe query falcon

Question 14

You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?

Options:

A.

Create an Event trigger workflow that triggers on an EPP Detection with an action to assign the detection to yourself

B.

Create an Event trigger workflow that triggers on an EPP Detection with conditions looking for the desired hostname

C.

Create an alert on usage of the tools and assign the alerts to you automatically via workflow

D.

Create an IOC for the host to trigger associated detections and assign them to you via workflow

Question 15

What is true about User Accounts created by the Falcon Administrator?

Options:

A.

By default, all User Accounts are created with the Falcon Analyst role

B.

All new User Accounts are created using an employee identification number

C.

All User Accounts must start with the domain identifier and number

D.

All User Accounts must be created with an email address from the list of approved domains

Question 16

What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?

Options:

A.

Host Modification Protection

B.

System Configuration Protection

C.

Sensor Tampering Protection

D.

Sensor Modification Protection

Question 17

What happens to policy assignment when a host does not match any custom host group criteria?

Options:

A.

The last active policy remains

B.

The default policy is applied

C.

No policy is applied

D.

The most restrictive policy is applied

Question 18

To improve the organization’s security posture, you are designing a Fusion SOAR workflow to generate an alert when critical vulnerabilities are detected by Falcon. When creating a new workflow from scratch, what component of the workflow must be configured first?

Options:

A.

Action

B.

Trigger

C.

Condition

D.

Workflow Name

Question 19

What happens to detections in the console after clicking “Disable Detections” for a host from within the Host Management page?

Options:

A.

All detection data for the host is deleted and the host is hidden from view

B.

Existing detections for the host remain

C.

New detections are disabled for 30 days

D.

The detections for the host are removed from the console immediately

Question 20

Which ML exclusion pattern would be the most accurate for all .exe binaries in “C:\Program Files\Software\”, including any subfolders of Software?

Options:

A.

Program Files\Software* .exe

B.

Program Files\Software*.exe

C.

Program Files\Software* *.exe

D.

***.exe

Question 21

What prevention policy settings must be enabled to quarantine files on the host?

Options:

A.

Quarantine Files; Windows Anti-Malware Execution Blocking

B.

Malware Protection; Custom Execution Blocking

C.

Next-Gen Antivirus Prevention sliders; Quarantine & Security Center Registration

D.

Advanced Remediation Actions; Quarantine level set to Aggressive

Question 22

In order to prevent duplicate Agent IDs, what install parameter should be used on VMs to be used as persistent clones?

Options:

A.

ProvNoWait=1

B.

VDI=true

C.

NO_START=1

D.

VM=True

Question 23

From the Host management page, what is the best field to filter by for Domain Controllers to obtain sensor version information?

Options:

A.

Sensor Version

B.

Type

C.

Platform

D.

OS Version

Question 24

When searching for a host network address, which IP notation should be used?

Options:

A.

10 10105,1010108

B.

1010102,10 10107

C.

192.168.5.1/24

D.

192 168 5 1-100

Question 25

Your leadership wants controls in place for immediate action on any OverWatch detections. What should you do to ensure the host is contained quickly and notifies the appropriate staff?

Options:

A.

Create a Fusion SOAR workflow using the OverWatch playbook to contain the host and email the SOC team

B.

Create a Fusion SOAR workflow to contain the host and email the OverWatch team

C.

Create a Fusion SOAR workflow to trigger on an OverWatch detection and set it to block the detection

D.

Create a Fusion SOAR workflow to create a detection for OverWatch and email the SOC team

Question 26

Which report provides a filterable high-level overview of host information such as OS version, Device Type and Machine Domain, and also provides an active sensor heat map for a quick environment review?

Options:

A.

Sensor Status Report

B.

Sensor Report

C.

Sensor Overview Report

D.

Sensor Policy Daily Report

Question 27

How can you search for multiple hostnames at the same time via Host Management?

Options:

A.

Enter the multiple hostnames in the Hostname filter separating each by a comma

B.

Add the Hostname filter multiple times and enter separate hostnames into each filter

C.

Enter the multiple hostnames in the Hostname filter separating each by a decimal

D.

Add the Multiple Hostnames filter and enter your list of hostnames

Question 28

You are assigning sensor group tags during installation. What is the maximum allowed length of all tags?

Options:

A.

237 characters

B.

256 characters

C.

50 characters

D.

100 characters

Question 29

How are custom roles assigned to users to perform a specific action on a module?

Options:

A.

Users get all permissions by default

B.

Permissions are enabled in roles, and these roles are assigned to users

C.

By adding each module to a role

D.

Permissions are assigned to users directly in user management

Question 30

What is the purpose of the Machine-Learning Prevention Monitoring Audit Log?

Options:

A.

It is the dashboard used by an analyst to view all items quarantined and to release any items deemed non-malicious

B.

It is the dashboard used to see machine-learning preventions, and it is used to identify spikes in activity and possible targeted attacks

C.

It is designed to show malicious processes that would have been blocked in your environment based on different Machine-Learning Prevention settings

D.

It is designed to give an administrator a quick overview of machine-learning aggressiveness settings as well as the numbers of items actually quarantined

Page: 1 / 10
Total 100 questions