Pass the CrowdStrike CrowdStrike Falcon Certification Program CCFA-200 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

How do you assign a Prevention policy to one or more hosts?

Options:

A.

Create a new policy and assign it directly to those hosts on the Host Management page


B.

Modify the users roles on the User Management page


C.

Ensure the hosts are in a group and assign that group to a custom Prevention policy


D.

Create a new policy and assign it directly to those hosts on the Prevention policy page


Expert Solution
Questions # 32:

When would the No Action option be assigned to a hash in IOC Management?

Options:

A.

When you want to save the indicator for later action, but do not want to block or allow it at this time


B.

Add the indicator to your allowlist and do not detect it


C.

There is no such option as No Action available in the Falcon console


D.

Add the indicator to your blocklist and show it as a detection


Expert Solution
Questions # 33:

The Logon Activities Report includes all of the following information for a particular user EXCEPT __________.

Options:

A.

the account type for the user (e.g. Domain Administrator, Local User)


B.

all hosts the user logged into


C.

the logon type (e.g. interactive, service)


D.

the last time the user's password was set


Expert Solution
Questions # 34:

Which Real Time Response role will allow you to see all analyst session details?

Options:

A.

Real Time Response - Read-Only Analyst


B.

None of the Real Time Response roles allows this


C.

Real Time Response -Active Responder


D.

Real Time Response -Administrator


Expert Solution
Questions # 35:

An analyst is asked to retrieve an API client secret from a previously generated key. How can they achieve this?

Options:

A.

The API client secret can be viewed from the Edit API client pop-up box


B.

Enable the Client Secret column to reveal the API client secret


C.

Re-create the API client using the exact name to see the API client secret


D.

The API client secret cannot be retrieved after it has been created


Expert Solution
Questions # 36:

A Falcon Administrator is trying to use Real-Time Response to start a session with a host that has a sensor installed but they are unable to connect. What is the most likely cause?

Options:

A.

The host has a user logged into it


B.

The domain controller is preventing the connection


C.

They do not have an RTR role assigned to them


D.

There is another analyst connected into it


Expert Solution
Questions # 37:

You are attempting to install the Falcon sensor on a host with a slow Internet connection and the installation fails after 20 minutes. Which of the following parameters can be used to override the 20-minute default provisioning window?

Options:

A.

ExtendedWindow=1


B.

Timeout=0


C.

ProvNoWait=1


D.

Timeout=30


Expert Solution
Questions # 38:

Which of the following controls the speed in which your sensors will receive automatic sensor updates?

Options:

A.

Maintenance Tokens


B.

Sensor Update Policy


C.

Sensor Update Throttling


D.

Channel File Update Throttling


Expert Solution
Questions # 39:

How can a Falcon Administrator configure a pop-up message to be displayed on a host when the Falcon sensor blocks, kills or quarantines an activity?

Options:

A.

By ensuring each user has set the "pop-ups allowed" in their User Profile configuration page


B.

By enabling "Upload quarantined files" in the General Settings configuration page


C.

By turning on the "Notify End Users" setting at the top of the Prevention policy details configuration page


D.

By selecting "Enable pop-up messages" from the User configuration page


Expert Solution
Questions # 40:

When a host belongs to more than one host group, how is sensor update precedence determined?

Options:

A.

Groups have no impact on sensor update policies


B.

Sensors of hosts that belong to more than one group must be manually updated


C.

The highest precedence policy from the most important group is applied to the host


D.

All of the host's groups are examined in aggregate and the policy with highest precedence is applied to the host


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions