Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CrowdStrike CCFA-200 CrowdStrike Certified Falcon Administrator Exam Practice Test

Page: 1 / 15
Total 153 questions

CrowdStrike Certified Falcon Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$36  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$31.5  $104.99
Question 1

What can exclusions be applied to?

Options:

A.

Individual hosts selected by the administrator

B.

Either all hosts or specified groups

C.

Only the default host group

D.

Only the groups selected by the administrator

Question 2

In order to quarantine files on the host, what prevention policy settings must be enabled?

Options:

A.

Malware Protection and Custom Execution Blocking must be enabled

B.

Next-Gen Antivirus Prevention sliders and "Quarantine & Security Center Registration" must be enabled

C.

Malware Protection and Windows Anti-Malware Execution Blocking must be enabled

D.

Behavior-Based Threat Prevention sliders and Advanced Remediation Actions must be enabled

Question 3

Which of the following is NOT an available filter on the Hosts Management page?

Options:

A.

Hostname

B.

Username

C.

Group

D.

OS Version

Question 4

Which of the following is a valid step when troubleshooting sensor installation failure?

Options:

A.

Confirm all required services are running on the system

B.

Enable the Windows firewall

C.

Disable SSL and TLS on the host

D.

Delete any available application crash log files

Question 5

Which is the correct order for manually installing a Falcon Package on a macOS system?

Options:

A.

Install the Falcon package, then register the Falcon Sensor via the registration package

B.

Install the Falcon package, then register the Falcon Sensor via command line

C.

Register the Falcon Sensor via command line, then install the Falcon package

D.

Register the Falcon Sensor via the registration package, then install the Falcon package

Question 6

How does the Unique Hosts Connecting to Countries Map help an administrator?

Options:

A.

It highlights countries with known malware

B.

It helps visualize global network communication

C.

It identifies connections containing threats

D.

It displays intrusions from foreign countries

Question 7

Which of the following can a Falcon Administrator edit in an existing user's profile?

Options:

A.

First or Last name

B.

Phone number

C.

Email address

D.

Working groups

Question 8

What three things does a workflow condition consist of?

Options:

A.

A parameter, an operator, and a value

B.

A beginning, a middle, and an end

C.

Triggers, actions, and alerts

D.

Notifications, alerts, and API's

Question 9

What is the primary purpose of using glob syntax in an exclusion?

Options:

A.

To specify a Domain be excluded from detections

B.

To specify exclusion patterns to easily exclude files and folders and extensions from detections

C.

To specify exclusion patterns to easily add files and folders and extensions to be prevented

D.

To specify a network share be excluded from detections

Question 10

An inactive host that does not contact the Falcon cloud will be automatically removed from the Host Management and Trash pages after how many days?

Options:

A.

45 Days

B.

60 Days

C.

75 Days

D.

90 Days

Question 11

Where can you find your company's Customer ID (CID)?

Options:

A.

The CID is a secret key used for Falcon communication and is never shared with the customer

B.

The CID is only available by calling support

C.

The CID is located at Hosts setup and management > Deploy > Sensor Downloads and is listed along with the

checksum

D.

The CID is located at Hosts > Host Management

Question 12

Which statement is TRUE regarding disabling detections on a host?

Options:

A.

Hosts with detections disabled will not alert on blocklisted hashes or machine learning detections, but will still alert on lOA-based detections. It will remain that way until detections are enabled again

B.

Hosts with detections disabled will not alert on anything until detections are enabled again

C.

Hosts with detections disabled will not alert on anything for 24 hours (by default) or longer if that setting is changed

D.

Hosts cannot have their detections disabled individually

Question 13

Which of the following pages provides a count of sensors in Reduced Functionality Mode (RFM) by Operating System?

Options:

A.

Support and resources

B.

Activity Overview

C.

Hosts Overview

D.

Sensor Health

Question 14

Which report lists counts of sensors in Reduced Functionality Mode (RFM) for all operating system types, and tracks how long a sensor version will be supported?

Options:

A.

Reduce Functionality Audit Report

B.

Sensor Health Report

C.

Sensor Coverage Lookup

D.

Inactive Sensor Report

Question 15

What are custom alerts based on?

Options:

A.

Custom workflows

B.

Custom event based triggers

C.

Predefined alert templates

D.

User defined Splunk queries

Question 16

How do you assign a Prevention policy to one or more hosts?

Options:

A.

Create a new policy and assign it directly to those hosts on the Host Management page

B.

Modify the users roles on the User Management page

C.

Ensure the hosts are in a group and assign that group to a custom Prevention policy

D.

Create a new policy and assign it directly to those hosts on the Prevention policy page

Question 17

What would be the most appropriate action to take if you wanted to prevent a folder from being uploaded to the cloud without disabling uploads globally?

Options:

A.

A Machine Learning exclusion

B.

A Sensor Visibility exclusion

C.

An IOA exclusion

D.

A Custom IOC entry

Question 18

When a Linux host is in Reduced Functionality Mode (RFM) what telemetry and protection is still offered?

Options:

A.

The sensor would provide protection as normal, without event telemetry

B.

The sensor would provide minimal protection

C.

The sensor would function as normal

D.

The sensor provides no protection, and only collects Sensor Heart Beat events

Question 19

The Customer ID (CID) is important in which of the following scenarios?

Options:

A.

When adding a user to the Falcon console under the Users application

B.

When performing the sensor installation process

C.

When setting up API keys

D.

When performing a Host Search

Question 20

What is likely the reason your Windows host would be in Reduced Functionality Mode (RFM)?

Options:

A.

Microsoft updates altering the kernel

B.

The host lost internet connectivity

C.

A misconfiguration in your prevention policy for the host

D.

A Sensor Update Policy was misconfigured

Question 21

You need to export a list of all deletions for a specific Host Name in the last 24 hours. What is the best way to do this?

Options:

A.

Go to Host Management in the Host page. Select the host and use the Export Detections button

B.

Utilize the Detection Resolution Dashboard. Use the filters to focus on the appropriate hostname and time, then export the results from the "Detection Resolution History" section

C.

In the Investigate module, access the Detection Activity page. Use the filters to focus on the appropriate hostname and time, then export the results

D.

Utilize the Detection Activity Dashboard. Use the filters to focus on the appropriate hostname and time, then export the results from the "Detections by Host" section

Question 22

Which option best describes the general process Whereinstallation of the Falcon Sensor on MacOS?

Options:

A.

Grant the Falcon Package Full Disk Access, install the Falcon package, use falconctl to license the sensor

B.

Install the Falcon package passing it the installation token in the command line

C.

Install the Falcon package, use falconctl to license the sensor, approve the system extension, grant the sensor Full Disk Access

D.

Grant the Falcon Package Full Disk Access, install the Falcon package, load the Falcon Sensor with the command 'falconctl stats'

Question 23

What command should be run to verify if a Windows sensor is running?

Options:

A.

regedit myfile.reg

B.

sc query csagent

C.

netstat -f

D.

ps -ef | grep falcon

Question 24

How do you find a list of inactive sensors?

Options:

A.

The Falcon platform does not provide reporting for inactive sensors

B.

A sensor is always considered active until removed by an Administrator

C.

Run the Inactive Sensor Report in the Host setup and management option

D.

Run the Sensor Aging Report within the Investigate option

Question 25

Which role is required to manage groups and policies in Falcon?

Options:

A.

Falcon Host Analyst

B.

Falcon Host Administrator

C.

Prevention Hashes Manager

D.

Falcon Host Security Lead

Question 26

The alignment of a particular prevention policy to one or more host groups can be completed in which of the following locations within Falcon?

Options:

A.

Policy alignment is configured in the "Host Management" section in the Hosts application

B.

Policy alignment is configured only once during the initial creation of the policy in the "Create New Policy" pop-up window

C.

Policy alignment is configured in the General Settings section under the Configuration menu

D.

Policy alignment is configured in each policy in the "Assigned Host Groups" tab

Question 27

Why is the ability to disable detections helpful?

Options:

A.

It gives users the ability to set up hosts to test detections and later remove them from the console

B.

It gives users the ability to uninstall the sensor from a host

C.

It gives users the ability to allowlist a false positive detection

D.

It gives users the ability to remove all data from hosts that have been uninstalled

Question 28

When creating an API client, which of the following must be saved immediately since it cannot be viewed again after the client is created?

Options:

A.

Base URL

B.

Secret

C.

Client ID

D.

Client name

Question 29

Which command would tell you if a Falcon Sensor was running on a Windows host?

Options:

A.

cswindiag.exe -status

B.

netstat.exe -f

C.

sc.exe query csagent

D.

sc.exe query falcon

Question 30

Which of the following is NOT an available action for an API Client?

Options:

A.

Edit an API Client

B.

Reset an API Client Secret

C.

Retrieve an API Client Secret

D.

Delete an API Client

Question 31

How are user permissions set in Falcon?

Options:

A.

Permissions are assigned to a User Group and then users are assigned to that group, thereby inheriting those permissions

B.

Pre-defined permissions are assigned to sets called roles. Users can be assigned multiple roles based on job function and they assume a cumulative set of permissions based on those assignments

C.

An administrator selects individual granular permissions from the Falcon Permissions List during user creation

D.

Permissions are token-based. Users request access to a defined set of permissions and an administrator adds their token to the set of permissions

Question 32

An administrator creating an exclusion is limited to applying a rule to how many groups of hosts?

Options:

A.

File exclusions are not aligned to groups or hosts

B.

There is a limit of three groups of hosts applied to any exclusion

C.

There is no limit and exclusions can be applied to any or all groups

D.

Each exclusion can be aligned to only one group of hosts

Question 33

Why would you assign hosts to a static group instead of a dynamic group?

Options:

A.

You do not want the group membership to change automatically

B.

You are managing more than 1000 hosts

C.

You need hosts to be automatically assigned to a group

D.

You want the group to contain hosts from multiple operating systems

Question 34

What type of information is found in the Linux Sensors Dashboard?

Options:

A.

Hosts by Kernel Version, Shells spawned by Root, Wget/Curl Usage

B.

Hidden File execution, Execution of file from the trash, Versions Running with Computer Names

C.

Versions running, Directory Made Invisible to Spotlight, Logging/Auditing Referenced, Viewed, or Modified

D.

Private Information Accessed, Archiving Tools – Exfil, Files Made Executable

Question 35

Where in the console can you find a list of all hosts in your environment that are in Reduced Functionality Mode (RFM)?

Options:

A.

Host Dashboard

B.

Host Management > Filter for RFM

C.

Inactive Sensor Report

D.

Containment Policy

Question 36

What should be disabled on firewalls so that the sensor's man-in-the-middle attack protection works properly?

Options:

A.

Deep packet inspection

B.

Linux Sub-System

C.

PowerShell

D.

Windows Proxy

Question 37

Which of the following controls the speed in which your sensors will receive automatic sensor updates?

Options:

A.

Maintenance Tokens

B.

Sensor Update Policy

C.

Sensor Update Throttling

D.

Channel File Update Throttling

Question 38

Which Real Time Response role will allow you to see all analyst session details?

Options:

A.

Real Time Response - Read-Only Analyst

B.

None of the Real Time Response roles allows this

C.

Real Time Response -Active Responder

D.

Real Time Response -Administrator

Question 39

What information does the API Audit Trail Report provide?

Options:

A.

A list of analyst login activity

B.

A list of specific changes to prevention policy

C.

A list of actions taken via Falcon OAuth2-based APIs

D.

A list of newly added hosts

Question 40

What is the purpose of a containment policy?

Options:

A.

To define which Falcon analysts can contain endpoints

B.

To define the duration of Network Containment

C.

To define the trigger under which a machine is put in Network Containment (e.g. a critical detection)

D.

To define allowed IP addresses over which your hosts will communicate when contained

Question 41

What is the name for the unique host identifier in Falcon assigned to each sensor during sensor installation?

Options:

A.

Endpoint ID (EID)

B.

Agent ID (AID)

C.

Security ID (SID)

D.

Computer ID (CID)

Question 42

What will happen to a host if it is not assigned a Sensor Update policy?

Options:

A.

The host will uninstall the Sensor and provide an alert to the installation team

B.

The host will automatically update to the newest sensor version and auto-update to future release

C.

The host will automatically create a custom Sensor Update policy

D.

The host will use the Default Sensor Update policy

Question 43

Where can you modify settings to permit certain traffic during a containment period?

Options:

A.

Prevention Policy

B.

Host Settings

C.

Containment Policy

D.

Firewall Settings

Question 44

Your CISO has decided all Falcon Analysts should also have the ability to view files and file contents locally on compromised hosts, but without the ability to take them off the host. What is the most appropriate role that can be added to fullfil this requirement?

Options:

A.

Remediation Manager

B.

Real Time Responder – Read Only Analyst

C.

Falcon Analyst – Read Only

D.

Real Time Responder – Active Responder

Question 45

Under the "Next-Gen Antivirus: Cloud Machine Learning" setting there are two categories, one of them is "Cloud Anti-Malware" and the other is:

Options:

A.

Adware & PUP

B.

Advanced Machine Learning

C.

Sensor Anti-Malware

D.

Execution Blocking

Page: 1 / 15
Total 153 questions