Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

CrowdStrike CCFH-202 Dumps

Page: 1 / 6
Total 60 questions

CrowdStrike Certified Falcon Hunter Questions and Answers

Question 1

In which of the following stages of the Cyber Kill Chain does the actor not interact with the victim endpoint(s)?

Options:

A.

Exploitation

B.

Weaponization

C.

Command & control

D.

Installation

Question 2

While you're reviewing Unresolved Detections in the Host Search page, you notice the User Name column contains "hostnameS " What does this User Name indicate?

Options:

A.

The User Name is a System User

B.

The User Name is not relevant for the dashboard

C.

There is no User Name associated with the event

D.

The Falcon sensor could not determine the User Name

Question 3

Which Falcon documentation guide should you reference to hunt for anomalies related to scheduled tasks and other Windows related artifacts?

Options:

A.

Hunting and Investigation

B.

Customizable Dashboards

C.

MITRE-Based Falcon Detections Framework

D.

Events Data Dictionary

Question 4

To find events that are outliers inside a network,___________is the best hunting method to use.

Options:

A.

time-based

B.

machine learning

C.

searching

D.

stacking

Question 5

In the Powershell Hunt report, what does the filtering condition of commandLine! ="*badstring* " do?

Options:

A.

Prevents command lines containing "badstring" from being displayed

B.

Displays only the command lines containing "badstring"

C.

Highlights "badstring" in all command lines in the output

D.

Highlights only the command lines containing "badstring"

Question 6

Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?

Options:

A.

Installing a backdoor on the victim endpoint

B.

Discovering internet-facing servers

C.

Emailing the intended victim with a malware attachment

D.

Loading a malicious payload into a common DLL

Question 7

What kind of activity does a User Search help you investigate?

Options:

A.

A history of Falcon Ul logon activity

B.

A list of process activity executed by the specified user account

C.

A count of failed user logon activity

D.

A list of DNS queries by the specified user account

Question 8

You want to produce a list of all event occurrences along with selected fields such as the full path, time, username etc.Which command would be the appropriate choice?

Options:

A.

fields

B.

distinctcount

C.

table

D.

values

Question 9

Which of the following is a way to create event searches that run automatically and recur on a schedule that you set?

Options:

A.

Workflows

B.

Event Search

C.

Scheduled Searches

D.

Scheduled Reports

Page: 1 / 6
Total 60 questions