Pass the CrowdStrike CrowdStrike Falcon Certification Program CCFA-200 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

What is the function of a single asterisk (*) in an ML exclusion pattern?

Options:

A.

The single asterisk will match any number of characters, including none. It does include separator characters, such as \ or /, which separate portions of a file path


B.

The single asterisk will match any number of characters, including none. It does not include separator characters, such as \ or /, which separate portions of a file path


C.

The single asterisk is the insertion point for the variable list that follows the path


D.

The single asterisk is only used to start an expression, and it represents the drive letter


Expert Solution
Questions # 22:

Which of the following is TRUE of the Logon Activities Report?

Options:

A.

Shows a graphical view of user logon activity and the hosts the user connected to


B.

The report can be filtered by computer name


C.

It gives a detailed list of all logon activity for users


D.

It only gives a summary of the last logon activity for users


Expert Solution
Questions # 23:

Which of the following Machine Learning (ML) sliders will only detect or prevent high confidence malicious items?

Options:

A.

Aggressive


B.

Cautious


C.

Minimal


D.

Moderate


Expert Solution
Questions # 24:

On a Windows host, what is the best command to determine if the sensor is currently running?

Options:

A.

sc query csagent


B.

netstat -a


C.

This cannot be accomplished with a command


D.

ping falcon.crowdstrike.com


Expert Solution
Questions # 25:

What type of information is found in the Linux Sensors Dashboard?

Options:

A.

Hosts by Kernel Version, Shells spawned by Root, Wget/Curl Usage


B.

Hidden File execution, Execution of file from the trash, Versions Running with Computer Names


C.

Versions running, Directory Made Invisible to Spotlight, Logging/Auditing Referenced, Viewed, or Modified


D.

Private Information Accessed, Archiving Tools – Exfil, Files Made Executable


Expert Solution
Questions # 26:

How does the Unique Hosts Connecting to Countries Map help an administrator?

Options:

A.

It highlights countries with known malware


B.

It helps visualize global network communication


C.

It identifies connections containing threats


D.

It displays intrusions from foreign countries


Expert Solution
Questions # 27:

Which of the following is an effective Custom IOA rule pattern to kill any process attempting to access www.badguydomain.com?

Options:

A.

.*badguydomain.com.*


B.

\Device\HarddiskVolume2\*.exe -SingleArgument www.badguydomain.com /kill


C.

badguydomain\.com.*


D.

Custom IOA rules cannot be created for domains


Expert Solution
Questions # 28:

Where do you obtain the Windows sensor installer for CrowdStrike Falcon?

Options:

A.

Sensors are downloaded from the Hosts > Sensor Downloads


B.

Sensor installers are unique to each customer and must be obtained from support


C.

Sensor installers are downloaded from the Support section of the CrowdStrike website


D.

Sensor installers are not used because sensors are deployed from within Falcon


Expert Solution
Questions # 29:

When troubleshooting the Falcon Sensor on Windows, what is the correct parameter to output the log directory to a specified file?

Options:

A.

LOG=log.txt


B.

\log log.txt


C.

C:\CSSensorlnstall\LogFiles


D.

/log log.txt


Expert Solution
Questions # 30:

How are user permissions set in Falcon?

Options:

A.

Permissions are assigned to a User Group and then users are assigned to that group, thereby inheriting those permissions


B.

Pre-defined permissions are assigned to sets called roles. Users can be assigned multiple roles based on job function and they assume a cumulative set of permissions based on those assignments


C.

An administrator selects individual granular permissions from the Falcon Permissions List during user creation


D.

Permissions are token-based. Users request access to a defined set of permissions and an administrator adds their token to the set of permissions


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions