Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

CrowdStrike Certified Falcon Hunter CCFH-202b Question # 5 Topic 1 Discussion

CrowdStrike Certified Falcon Hunter CCFH-202b Question # 5 Topic 1 Discussion

CCFH-202b Exam Topic 1 Question 5 Discussion:
Question #: 5
Topic #: 1

You identify an instance of a user in your environment utilizing a Cloudflared tunnel daemon, resulting in unusual command line activity. What steps would you take to determine if the unusual activity is malicious or legitimate?


A.

Block all instances of Cloudflared in your environment and perform a forensic investigation into the host


B.

Create a forensic image of the hard drive and analyze it for indicators of compromise


C.

Immediately network contain the host and perform a forensic investigation into the host


D.

Review the specific commands associated and compare them with known legitimate use cases to confirm if patterns align with normal operations


Get Premium CCFH-202b Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.