CrowdStrike Certified Falcon Hunter Questions and Answers
In which of the following stages of the Cyber Kill Chain does the actor not interact with the victim endpoint(s)?
While you're reviewing Unresolved Detections in the Host Search page, you notice the User Name column contains "hostnameS " What does this User Name indicate?
Which Falcon documentation guide should you reference to hunt for anomalies related to scheduled tasks and other Windows related artifacts?
To find events that are outliers inside a network,___________is the best hunting method to use.
In the Powershell Hunt report, what does the filtering condition of commandLine! ="*badstring* " do?
Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?
What kind of activity does a User Search help you investigate?
You want to produce a list of all event occurrences along with selected fields such as the full path, time, username etc.Which command would be the appropriate choice?
Which of the following is a way to create event searches that run automatically and recur on a schedule that you set?