Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCFA-200 Exam Dumps - CrowdStrike Certified Falcon Administrator

Go to page:
Question # 33

You have created a Sensor Update Policy for the Mac platform. Which other operating system(s) will this policy manage?

A.

*nix

B.

Windows

C.

Both Windows and *nix

D.

Only Mac

Full Access
Question # 34

Which of the following applies to Custom Blocking Prevention Policy settings?

A.

Hashes must be entered on the Prevention Hashes page before they can be blocked via this policy

B.

Blocklisting applies to hashes, IP addresses, and domains

C.

Executions blocked via hash blocklist may have partially executed prior to hash calculation process remediation may be necessary

D.

You can only blocklist hashes via the API

Full Access
Question # 35

What is the purpose of a containment policy?

A.

To define which Falcon analysts can contain endpoints

B.

To define the duration of Network Containment

C.

To define the trigger under which a machine is put in Network Containment (e.g. a critical detection)

D.

To define allowed IP addresses over which your hosts will communicate when contained

Full Access
Question # 36

You have been asked to troubleshoot why Script Based Execution Monitoring (SBEM) is not enabled on a Falcon host. Which report can be used to determine if this is an issue with an old prevention policy?

A.

Host Update Status Report

B.

Custom Alerting Audit Trail

C.

Prevention Policy Debug

D.

SBEM Debug Report

Full Access
Question # 37

On which page of the Falcon console can one locate the Customer ID (CID)?

A.

Hosts Management

B.

API Clients and Keys

C.

Sensor Dashboard

D.

Sensor Downloads

Full Access
Question # 38

To enhance your security, you want to detect and block based on a list of domains and IP addresses. How can you use IOC management to help this objective?

A.

Blocking of Domains and IP addresses is not a function of IOC management. A Custom IOA Rule should be used instead

B.

Using IOC management, import the list of hashes and IP addresses and set the action to Detect Only

C.

Using IOC management, import the list of hashes and IP addresses and set the action to Prevent/Block

D.

Using IOC management, import the list of hashes and IP addresses and set the action to No Action

Full Access
Question # 39

Which of the following options is a feature found ONLY with the Sensor-based Machine Learning (ML)?

A.

Next-Gen Antivirus (NGAV) protection

B.

Adware and Potentially Unwanted Program detection and prevention

C.

Real-time offline protection

D.

Identification and analysis of unknown executables

Full Access
Question # 40

Which of the following controls the speed in which your sensors will receive automatic sensor updates?

A.

Maintenance Tokens

B.

Sensor Update Policy

C.

Sensor Update Throttling

D.

Channel File Update Throttling

Full Access
Go to page: