Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CrowdStrike CCFH-202b Dumps

Page: 1 / 6
Total 60 questions

CrowdStrike Certified Falcon Hunter Questions and Answers

Question 1

You suspect that a user is abusing their admin privileges and you want to see the recent commands they have been utilizing. Which Investigate search will identify this?

Options:

A.

Host Search

B.

Process timeline

C.

User Search

D.

Process Context

Question 2

What can a hunter add at the end of a search string in Advanced Event Search to identify outliers when quantifying the results?

Options:

A.

| groupBy()

B.

| eval()

C.

| sample()

D.

| stats()

Question 3

Refer to the image.

as

Why are there six pending containment events?

Options:

A.

When requesting containment of a device, there is one event to contain the host by Agent ID and another event to contain by Mac Address

B.

When requesting containment of a device, there is one event for checking of the current host state and another corresponding to the change request

C.

When requesting containment of a device, there is one event to contain the host by Agent ID and another event to contain by Host Name

D.

When requesting containment of a device, there is one event for the change request and another corresponding to the completed status of the request

Question 4

Refer to the image. Which query will show file execution from a suspicious directory across all hosts?

Options:

A.

#event_simpleName=ProcessRollup2 | aid=* | ImageFileName=/\\Users\\[^\\]+\\Desktop\\/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName] ), limit-max)

B.

#event_simpleName=ProcessRollup2 | aid=c28082797f7f4d81b3f869dbaf6eb712 | ImageFileName=/\$Recycle\.Bin/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName]), limit-max)

C.

#event_simpleName=ProcessRollup2 | aid=* | ImageFileName=/\$Recycle\.Bin/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName]), limit-max)

D.

#event_simpleName=ProcessRollup2 | aid=* | ImageFileName=/\\Users\\[^\\]+\\Downloads\\/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName] ), limit-max)

Question 5

Refer to the image.

as

What aggregate function in the CrowdStrike Query Language (CQL) was used to provide the filtered results?

Options:

A.

eval

B.

groupBy

C.

table

D.

stats

Question 6

You've been tasked with writing a query that would rename the RemoteAddressIP4 field to SourceIP. What would be the correct syntax using the rename() function?

Options:

A.

| rename(RemoteAddressIP=SourceIP)

B.

| rename(RemoteAddressIP4, as=SourceIP)

C.

| rename(RemoteAddressIP4 > > SourceIP)

D.

| rename(RemoteAddressIP4 := SourceIP)

Question 7

Which document can reference any searchable event and its description?

Options:

A.

Events Index

B.

Query Builder

C.

Advanced Event Search

D.

Events Full Reference (Events Data Dictionary)

Question 8

What will the following obfuscated command do?

cmd /c "set x=^n^e^t & set y=@er & set yy=z & set z=r & set r=remove & set f=Domain+ff & set ff=Admin & set g=gumball@ & echo %x%%y:@=us% /%z:r=add% %ff% %g:@=r% | cmd"

Options:

A.

Add a user named “Admin” to the local host

B.

Remove a user named “Admin” from the local host

C.

Change the password for a user named “Admin” to “%g:@=r%”

D.

Add a user named “Admin” to the Domain Admins group

Question 9

While performing a hunt for unusual PowerShell commands, you discover the following command being run on a single host:

powershell.exe "(New-Object

The process tree for this command looks like this:

winlogon.exe > userinit.exe > explorer.exe > powershell_ise.exe > powershell.exe All of the commands are run during normal working hours under the account of a user from the IT department. What should be your next steps in the investigation?

Options:

A.

Start an RTR (Real Time Response) session on the host. Check the user's Downloads folder for the file AppPathBypass.ps1 and analyze the file for malicious content.

B.

Mark the detection as True Positive. Trigger an automated remediation to remove all malicious files and methods of persistence.

C.

Mark the detection as a False Positive because nothing happened on the host.

D.

Perform a +/- 10-minute search for events around this process execution to get more context. Contact the user to confirm whether or not this was testing-related activity.

Question 10

Which hunting query's results could indicate that an adversary is performing reconnaissance from a specific host?

Options:

A.

#event_simpleName=ProcessRollup2 | aid=?aid | ImageFileName=/ (? < FileName > [^\\\/]*)$ / | FileName=/^(explorer|lsass|svchost|smss|winlogon|userinit)\.exe$/i | table([aid, UserName, ParentBaseFileName, ImageFileName, CommandLine] , limit=1000)

B.

#event_simpleName=NetworkScanEvent | aid=?aid | !cidr(RemoteAddressIP4, subnet=["224.0.0.0/4", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "127.0.0.0/8", "169.254.0.0/16", "0.0.0.0/32"]) | table([aid, UserName, ParentBaseFileName, ImageFileName, CommandLine] , limit=1000)

C.

#event_simpleName=NetworkConnect* | RemotePort=?RemotePort aid=?aid | !cidr(RemoteAddressIP4, subnet=["224.0.0.0/4", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "127.0.0.0/8", "169.254.0.0/16", "0.0.0.0/32"]) | table([aid, LocalAddressIP4, LocalPort, RemoteAddressIP4, RemotePort] , limit=1000)

D.

#event_simpleName=ProcessRollup2 | aid=?aid | ImageFileName=/ (? < FileName > [^\\\/]*)$ / | FileName=/^(net|ipconfig|whoami|quser|ping|netstat|tasklist|hostname|at)\.exe$/i | table([aid, UserName, ParentBaseFileName, ImageFileName, CommandLine] , limit=1000)

Question 11

You suspect one of your endpoint host systems may have a vulnerable BIOS version. Which Investigate Dashboard will confirm vulnerability information such as the type and timeline?

Options:

A.

BIOS Prevalence

B.

BIOS Analysis

C.

BIOS Search

D.

BIOS Firmware Inventory

Question 12

Refer to the image.

as

What line item of the query is used to perform outlier analysis?

Options:

A.

Line 6

B.

Line 3

C.

Line 4

D.

Line 7

Question 13

Your organization has identified a malicious Scheduled task that executes every 5 minutes. Which LogScale event search function can be used to quickly identify and display the unique hosts affected by the malware?

Options:

A.

stats

B.

table()

C.

groupBy()

D.

uniq

Question 14

You've experienced a ransomware infection that has spread throughout the enterprise. What is the first step you would take to determine the source of infection?

Options:

A.

Perform a PowerShell hunt to look for suspicious PowerShell commands

B.

Use Advanced Event Search to timeline encryption activity and determine the system with the first encryption event

C.

Utilize Exposure Management to identify systems with critical vulnerabilities that could be exploited

D.

Perform reverse engineering on the malware sample to see if you can find the infection vector

Question 15

You want to hunt for the least-used Windows services that are starting from non-standard locations. Which query below will provide this information?

Options:

A.

#event_simpleName=ServiceStarted ImageFileName!=/(\\servicing\\|\\SysWOW64\\)/i | groupBy([ServiceDisplayName], function=[collect([ImageFileName] ), count(as=count)], l imit=20000) | sort(field=count, limit=20000, order=asc)

B.

#event_simpleName=ServiceStarted ImageFileName!=/(\\servicing\\|\\Services\\)/i | groupBy([ServiceDisplayName], function=[collect([ImageFileName] ), count(as=count)], limit=20000) | sort(field=count, limit=20000, order=asc)

C.

#event_simpleName=ServiceStarted ImageFileName!=/(\\servicing\\|\\System32\\)/i | groupBy([ServiceDisplayName], function=[collect([ImageFileName] ), count(as=count)], limit=20000) | sort(field=count, limit=20000, order=asc)

D.

#event_simpleName=ServiceStarted ImageFileName=/(\\System32\\)/i | groupBy([ServiceDisplayName], function=[collect([ImageFileName] ), count(as=count)], limit=20000) | sort(field=count, limit=20000, order=asc)

Question 16

What is the purpose of this query?

#event_simpleName=UserLogon LogonType=10 RemoteAddressIP4=* | !cidr(RemoteAddressIP4, subnet=["224.0.0.0/4", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "127.0.0.0/8", "169.254.0.0/16", "0.0.0.0/32"]) | ipLocation(RemoteAddressIP4) | worldMap(ip=RemoteAddressIP4, magnitude=count(aid))

Options:

A.

Display all locations for local subnets on a map

B.

Display all users who are logging in from private IP ranges on a map

C.

Display geolocation data for all network logins on a map

D.

Display geolocation data for RDP connections on a map

Question 17

Which Investigate tool will show you which users have logged in to a particular server?

Options:

A.

Search by agent ID

B.

Host search

C.

User Search

D.

Bulk domains

Question 18

Falcon is generating detections for a malicious file evil.exe with varying filepaths on several hosts as end users attempt to execute the file. Which query can be used to proactively hunt where the file exists prior to the user executing it?

Options:

A.

#event_simpleName=ProcessRollup2 OR #event_simpleName=SyntheticProcessRollup2 | ImageFileName=/evil.exe/i | ImageFileName=/([\/\\])(? < FileName > \w*\.?\w*)$/ | stats count by aid, hostname, FileName, ImageFileName, CommandLine

B.

#event_simpleName=ProcessRollup2 OR #event_simpleName=SyntheticProcessRollup2 | aid=?aid | ImageFilePath=/C:\users\/ | ImageFileName=evil.exe | table([aid, hostname, FileName, ImageFileName, CommandLine], limit=1000)

C.

#event_simpleName=ProcessRollup2 OR #event_simpleName=SyntheticProcessRollup2 | aid=?aid | ImageFilePath=C:\users\*\evil.exe | table([aid, hostname, FileName, ImageFileName, CommandLine], limit=1000)

D.

#event_simpleName=ProcessRollup2 OR #event_simpleName=SyntheticProcessRollup2 | ImageFileName=/evil.exe/i | ImageFileName=/([\/\\])(? < FileName > \w*\.?\w*)$/ | table([aid, hostname, FileName, ImageFileName, CommandLine], limit=1000)

Page: 1 / 6
Total 60 questions