Pass the CrowdStrike CrowdStrike Falcon Certification Program CCFH-202 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following is TRUE about a Hash Search?

Options:

A.

Wildcard searches are not permitted with the Hash Search


B.

The Hash Search provides Process Execution History


C.

The Hash Search is available on Linux


D.

Module Load History is not presented in a Hash Search


Expert Solution
Questions # 2:

How do you rename fields while using transforming commands such as table, chart, and stats?

Options:

A.

By renaming the fields with the "rename" command after the transforming command e.g. "stats count by ComputerName | rename count AS total_count"


B.

You cannot rename fields as it would affect sub-queries and statistical analysis


C.

By using the "renamed" keyword after the field name eg "stats count renamed totalcount by ComputerName"


D.

By specifying the desired name after the field name eg "stats count totalcount by ComputerName"


Expert Solution
Questions # 3:

Which document provides information on best practices for writing Splunk-based hunting queries, predefined queries which may be customized to hunt for suspicious network connections, and predefined queries which may be customized to hunt for suspicious processes?

Options:

A.

Real Time Response and Network Containment


B.

Hunting and Investigation


C.

Events Data Dictionary


D.

Incident and Detection Monitoring


Expert Solution
Questions # 4:

When exporting the results of the following event search, what data is saved in the exported file (assuming Verbose Mode)? event_simpleName=*Written | stats count by ComputerName

Options:

A.

The text of the query


B.

The results of the Statistics tab


C.

No data Results can only be exported when the "table" command is used


D.

All events in the Events tab


Expert Solution
Questions # 5:

The Process Timeline Events Details table will populate the Parent Process ID and the Parent File columns when the cloudable Event data contains which event field?

Options:

A.

ContextProcessld_decimal


B.

RawProcessld_decimal


C.

ParentProcessld_decimal


D.

RpcProcessld_decimal


Expert Solution
Questions # 6:

What topics are presented in the Hunting and Investigation Guide?

Options:

A.

Detailed tutorial on writing advanced queries such as sub-searches and joins


B.

Detailed summary of event names, descriptions, and some key data fields for hunting and investigation


C.

Sample hunting queries, select walkthroughs and best practices for hunting with Falcon


D.

Recommended platform configurations and prevention settings to ensure detections are generated for hunting leads


Expert Solution
Questions # 7:

Which field should you reference in order to find the system time of a *FileWritten event?

Options:

A.

ContextTimeStamp_decimal


B.

FileTimeStamp_decimal


C.

ProcessStartTime_decimal


D.

timestamp


Expert Solution
Questions # 8:

In the Powershell Hunt report, what does the "score" signify?

Options:

A.

Number of hosts that ran the PowerShell script


B.

How recently the PowerShell script executed


C.

Maliciousness score determined by NGAV


D.

A cumulative score of the various potential command line switches


Expert Solution
Questions # 9:

Question # 9

What type of attack would this process tree indicate?

Options:

A.

Brute Forcing Attack


B.

Man-in-the-middle Attack


C.

Phishing Attack


D.

Web Application Attack


Expert Solution
Questions # 10:

What information is shown in Host Search?

Options:

A.

Quarantined Files


B.

Prevention Policies


C.

Intel Reports


D.

Processes and Services


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions