Pass the CrowdStrike CCFR CCFR-201 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

When analyzing an executable with a global prevalence of common; but you do not know what the executable is. what is the best course of action?

Options:

A.

Do nothing, as this file is common and well known


B.

From detection, click the VT Hash button to pivot to VirusTotal to investigate further


C.

From detection, use API manager to create a custom blocklist


D.

From detection, submit to FalconX for deep dive analysis


Expert Solution
Questions # 2:

Where are quarantined files stored on Windows hosts?

Options:

A.

Windows\Quarantine


B.

Windows\System32\Drivers\CrowdStrike\Quarantine


C.

Windows\System32\


D.

Windows\temp\Drivers\CrowdStrike\Quarantine


Expert Solution
Questions # 3:

What information is contained within a Process Timeline?

Options:

A.

All cloudable process-related events within a given timeframe


B.

All cloudable events for a specific host


C.

Only detection process-related events within a given timeframe


D.

A view of activities on Mac or Linux hosts


Expert Solution
Questions # 4:

The function of Machine Learning Exclusions is to___________.

Options:

A.

stop all detections for a specific pattern ID


B.

stop all sensor data collection for the matching path(s)


C.

Stop all Machine Learning Preventions but a detection will still be generated and files will still be uploaded to the CrowdStrike Cloud


D.

stop all ML-based detections and preventions for the matching path(s) and/or stop files from being uploaded to the CrowdStrike Cloud


Expert Solution
Questions # 5:

How long are quarantined files stored in the CrowdStrike Cloud?

Options:

A.

45 Days


B.

90 Days


C.

Days


D.

Quarantined files are not deleted


Expert Solution
Questions # 6:

Aside from a Process Timeline or Event Search, how do you export process event data from a detection in .CSV format?

Options:

A.

You can't export detailed event data from a detection, you have to use the Process Timeline or an Event Search


B.

In Full Detection Details, you expand the nodes of the process tree you wish to expand and then click the "Export Process Events" button


C.

In Full Detection Details, you choose the "View Process Activity" option and then export from that view


D.

From the Detections Dashboard, you right-click the event type you wish to export and choose CSV. JSON or XML


Expert Solution
Questions # 7:

Which option indicates a hash is allowlisted?

Options:

A.

No Action


B.

Allow


C.

Ignore


D.

Always Block


Expert Solution
Questions # 8:

What is an advantage of using the IP Search tool?

Options:

A.

IP searches provide manufacture and timezone data that can not be accessed anywhere else


B.

IP searches allow for multiple comma separated IPv6 addresses as input


C.

IP searches offer shortcuts to launch response actions and network containment on target hosts


D.

IP searches provide host, process, and organizational unit data without the need to write a query


Expert Solution
Questions # 9:

The Falcon platform will show a maximum of how many detections per day for a single Agent Identifier (AID)?

Options:

A.

500


B.

750


C.

1000


D.

1200


Expert Solution
Questions # 10:

You found a list of SHA256 hashes in an intelligence report and search for them using the Hash Execution Search. What can be determined from the results?

Options:

A.

Identifies a detailed list of all process executions for the specified hashes


B.

Identifies hosts that loaded or executed the specified hashes


C.

Identifies users associated with the specified hashes


D.

Identifies detections related to the specified hashes


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions