Pass the CrowdStrike CrowdStrike Falcon Certification Program CCFH-202 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is the main purpose of the Mac Sensor report?

Options:

A.

To identify endpoints that are in Reduced Functionality Mode


B.

To provide a summary view of selected activities on Mac hosts


C.

To provide vulnerability assessment for Mac Operating Systems


D.

To provide a dashboard for Mac related detections


Expert Solution
Questions # 12:

What elements are required to properly execute a Process Timeline?

Options:

A.

Agent ID (AID) and Target Process ID


B.

Agent ID (AID) only


C.

Hostname and Local Process ID


D.

Target Process ID only


Expert Solution
Questions # 13:

Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?

Options:

A.

Installing a backdoor on the victim endpoint


B.

Discovering internet-facing servers


C.

Emailing the intended victim with a malware attachment


D.

Loading a malicious payload into a common DLL


Expert Solution
Questions # 14:

To view Files Written to Removable Media within a specified timeframe on a host within the Host Search page, expand and refer to the _______dashboard panel.

Options:

A.

Command Line and Admin Tools


B.

Processes and Services


C.

Registry, Tasks, and Firewall


D.

Suspicious File Activity


Expert Solution
Questions # 15:

Which of the following Event Search queries would only find the DNS lookups to the domain: www randomdomain com?

Options:

A.

event_simpleName=DnsRequest DomainName=www randomdomain com


B.

event_simpleName=DnsRequest DomainName=randomdomain com ComputerName=localhost


C.

Dns=randomdomain com


D.

ComputerName=localhost DnsRequest "randomdomain com"


Expert Solution
Questions # 16:

The help desk is reporting an increase in calls related to user accounts being locked out over the last few days. You suspect that this could be an attack by an adversary against your organization. Select the best hunting hypothesis from the following:

Options:

A.

A zero-day vulnerability is being exploited on a Microsoft Exchange server


B.

A publicly available web application has been hacked and is causing the lockouts


C.

Users are locking their accounts out because they recently changed their passwords


D.

A password guessing attack is being executed against remote access mechanisms such as VPN


Expert Solution
Questions # 17:

With Custom Alerts you are able to configure email alerts using predefined templates so you're notified about specific activity in your environment. Which of the following outlines the steps required to properly create a custom alert rule?

Options:

A.

Choose the template you would like to configure, setup how often you would like the alert to run, and then schedule the alert


B.

Choose the template you would like to configure, preview the search results, and then schedule the alert


C.

Create the query for the alert, setup the email template for the alert, and then set the schedule for the alert


D.

Create a new custom template, configure the email template, and then create the custom query for the alert


Expert Solution
Questions # 18:

You need details about key data fields and sensor events which you may expect to find fromHosts running the Falcon sensor.Which documentation should you access?

Options:

A.

Events Data Dictionary


B.

Streaming API Event Dictionary


C.

Hunting and Investigation


D.

Event stream APIs


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions