11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CCFA-200 Exam Dumps - CrowdStrike Certified Falcon Administrator

Question # 4

Which of the following prevention policy settings monitors contents of scripts and shells for execution of malicious content on compatible operating systems?

A.

Script-based Execution Monitoring

B.

FileSystem Visibility

C.

Engine (Full Visibility)

D.

Suspicious Scripts and Commands

Full Access
Question # 5
A.

Enable Behavior-Based Threat Prevention sliders and Advanced Remediation Actions

B.

Enable Malware Protection and Windows Anti-Malware Execution Blocking

C.

Enable Next-Gen Antivirus Prevention sliders and "Quarantine & Security Center Registration

D.

Enable Malware Protection and Custom Execution Blocking

Full Access
Question # 6

What command should be run to verify if a Windows sensor is running?

A.

regedit myfile.reg

B.

sc query csagent

C.

netstat -f

D.

ps -ef | grep falcon

Full Access
Question # 7

Which of the following is an effective Custom IOA rule pattern to kill any process attempting to access www.badguydomain.com?

A.

.*badguydomain.com.*

B.

\Device\HarddiskVolume2\*.exe -SingleArgument www.badguydomain.com /kill

C.

badguydomain\.com.*

D.

Custom IOA rules cannot be created for domains

Full Access
Question # 8

On a Windows host, what is the best command to determine if the sensor is currently running?

A.

sc query csagent

B.

netstat -a

C.

This cannot be accomplished with a command

D.

ping falcon.crowdstrike.com

Full Access
Question # 9

Which is the correct order for manually installing a Falcon Package on a macOS system?

A.

Install the Falcon package, then register the Falcon Sensor via the registration package

B.

Install the Falcon package, then register the Falcon Sensor via command line

C.

Register the Falcon Sensor via command line, then install the Falcon package

D.

Register the Falcon Sensor via the registration package, then install the Falcon package

Full Access
Question # 10

On which page of the Falcon console would you create sensor groups?

A.

User management

B.

Sensor update policies

C.

Host management

D.

Host groups

Full Access
Question # 11

You need to export a list of all deletions for a specific Host Name in the last 24 hours. What is the best way to do this?

A.

Go to Host Management in the Host page. Select the host and use the Export Detections button

B.

Utilize the Detection Resolution Dashboard. Use the filters to focus on the appropriate hostname and time, then export the results from the "Detection Resolution History" section

C.

In the Investigate module, access the Detection Activity page. Use the filters to focus on the appropriate hostname and time, then export the results

D.

Utilize the Detection Activity Dashboard. Use the filters to focus on the appropriate hostname and time, then export the results from the "Detections by Host" section

Full Access
Question # 12

The Falcon Administrator has created a new prevention policy to apply to the "Servers" group; however, when applying the new prevention policy this group is not appearing in the list of available groups. What is the most likely issue?

A.

The new prevention policy should be enabled first

B.

The "Servers" group already has a policy applied to it

C.

The "Servers" group must be disabled first

D.

Host type was not defined correctly within the prevention policy

Full Access
Question # 13

How many "Auto" sensor version update options are available for Windows Sensor Update Policies?

A.

1

B.

2

C.

0

D.

3

Full Access
Question # 14

What best describes what happens to detections in the console after clicking "Disable Detections" for a host from within the Host Management page?

A.

The detections for the host are removed from the console immediately and no new detections will display in the console going forward

B.

You cannot disable detections for a host

C.

Existing detections for the host remain, but no new detections will display in the console going forward

D.

Preventions will be disabled for the host

Full Access
Question # 15

Which report can assist in determining the appropriate Machine Learning levels to set in a Prevention Policy?

A.

Sensor Report

B.

Machine Learning Prevention Monitoring

C.

Falcon UI Audit Trail

D.

Machine Learning Debug

Full Access
Question # 16

On the Host management page which filter could be used to quickly identify all devices categorized as a "Workstation" by the Falcon Platform?

A.

Status

B.

Platform

C.

Hostname

D.

Type

Full Access
Question # 17

Which option allows you to exclude behavioral detections from the detections page?

A.

Machine Learning Exclusion

B.

IOA Exclusion

C.

IOC Exclusion

D.

Sensor Visibility Exclusion

Full Access
Question # 18

Which is a filter within the Host setup and management > Host management page?

A.

User name

B.

OU

C.

BIOS Version

D.

Locality

Full Access
Question # 19

What is the primary purpose of using glob syntax in an exclusion?

A.

To specify a Domain be excluded from detections

B.

To specify exclusion patterns to easily exclude files and folders and extensions from detections

C.

To specify exclusion patterns to easily add files and folders and extensions to be prevented

D.

To specify a network share be excluded from detections

Full Access
Question # 20

After Network Containing a host, your Incident Response team states they are unable to remotely connect to the host. Which of the following would need to be configured to allow remote connections from specified IP's?

A.

Response Policy

B.

Containment Policy

C.

Maintenance Token

D.

IP Allowlist Management

Full Access
Question # 21

When performing targeted filtering for a host on the Host Management Page, which filter bar attribute is NOT case-sensitive?

A.

Username

B.

Model

C.

Domain

D.

Hostname

Full Access
Question # 22

What is likely the reason your Windows host would be in Reduced Functionality Mode (RFM)?

A.

Microsoft updates altering the kernel

B.

The host lost internet connectivity

C.

A misconfiguration in your prevention policy for the host

D.

A Sensor Update Policy was misconfigured

Full Access
Question # 23

How do you find a list of inactive sensors?

A.

The Falcon platform does not provide reporting for inactive sensors

B.

A sensor is always considered active until removed by an Administrator

C.

Run the Inactive Sensor Report in the Host setup and management option

D.

Run the Sensor Aging Report within the Investigate option

Full Access
Question # 24

You have determined that you have numerous Machine Learning detections in your environment that are false positives. They are caused by a single binary that was custom written by a vendor for you and that binary is running on many endpoints. What is the best way to prevent these in the future?

A.

Contact support and request that they modify the Machine Learning settings to no longer include this detection

B.

Using IOC Management, add the hash of the binary in question and set the action to "Allow"

C.

Using IOC Management, add the hash of the binary in question and set the action to "Block, hide detection"

D.

Using IOC Management, add the hash of the binary in question and set the action to "No Action"

Full Access
Question # 25

Which of the following tools developed by Crowdstrike is intended to help with removal of the CrowdStrike Windows Falcon Sensor?

A.

CrowdStrikeRemovalTool.exe

B.

UninstallTool.exe

C.

CSUninstallTool.exe

D.

FalconUninstall.exe

Full Access
Question # 26

The alignment of a particular prevention policy to one or more host groups can be completed in which of the following locations within Falcon?

A.

Policy alignment is configured in the "Host Management" section in the Hosts application

B.

Policy alignment is configured only once during the initial creation of the policy in the "Create New Policy" pop-up window

C.

Policy alignment is configured in the General Settings section under the Configuration menu

D.

Policy alignment is configured in each policy in the "Assigned Host Groups" tab

Full Access
Question # 27

You notice there are multiple Windows hosts in Reduced functionality mode (RFM). What is the most likely culprit causing these hosts to be in RFM?

A.

A Sensor Update Policy was misconfigured

B.

A host was offline for more than 24 hours

C.

A patch was pushed overnight to all Windows systems

D.

A host was placed in network containment from a detection

Full Access
Question # 28

Which statement describes what is recommended for the Default Sensor Update policy?

A.

The Default Sensor Update policy should align to an organization's overall sensor updating practice while leveraging Auto N-1 and Auto N-2 configurations where possible

B.

The Default Sensor Update should be configured to always automatically upgrade to the latest sensor version

C.

Since the Default Sensor Update policy is pre-configured with recommend settings out of the box, configuration of the Default Sensor Update policy is not required

D.

No configuration is required. Once a Custom Sensor Update policy is created the Default Sensor Update policy is disabled

Full Access
Question # 29

What statement is TRUE about managing a user's role?

A.

The Administrator cannot re-use the account email for a new account

B.

You must have Falcon MFA enabled first

C.

You must be a Falcon Security Lead

D.

You must be a Falcon Administrator

Full Access
Question # 30

When a user initiates a sensor installs, where can the logs be found?

A.

%SYSTEMROOT%\Logs

B.

%SYSTEMROOT%\Temp

C.

%LOCALAPPDATA%\Logs

D.

% LOCALAPP D ATA%\Tem p

Full Access
Question # 31

An analyst is asked to retrieve an API client secret from a previously generated key. How can they achieve this?

A.

The API client secret can be viewed from the Edit API client pop-up box

B.

Enable the Client Secret column to reveal the API client secret

C.

Re-create the API client using the exact name to see the API client secret

D.

The API client secret cannot be retrieved after it has been created

Full Access
Question # 32

Which role allows a user to connect to hosts using Real-Time Response?

A.

Endpoint Manager

B.

Falcon Administrator

C.

Real Time Responder – Active Responder

D.

Prevention Hashes Manager

Full Access
Question # 33

You have created a Sensor Update Policy for the Mac platform. Which other operating system(s) will this policy manage?

A.

*nix

B.

Windows

C.

Both Windows and *nix

D.

Only Mac

Full Access
Question # 34

Which of the following applies to Custom Blocking Prevention Policy settings?

A.

Hashes must be entered on the Prevention Hashes page before they can be blocked via this policy

B.

Blocklisting applies to hashes, IP addresses, and domains

C.

Executions blocked via hash blocklist may have partially executed prior to hash calculation process remediation may be necessary

D.

You can only blocklist hashes via the API

Full Access
Question # 35

What is the purpose of a containment policy?

A.

To define which Falcon analysts can contain endpoints

B.

To define the duration of Network Containment

C.

To define the trigger under which a machine is put in Network Containment (e.g. a critical detection)

D.

To define allowed IP addresses over which your hosts will communicate when contained

Full Access
Question # 36

You have been asked to troubleshoot why Script Based Execution Monitoring (SBEM) is not enabled on a Falcon host. Which report can be used to determine if this is an issue with an old prevention policy?

A.

Host Update Status Report

B.

Custom Alerting Audit Trail

C.

Prevention Policy Debug

D.

SBEM Debug Report

Full Access
Question # 37

On which page of the Falcon console can one locate the Customer ID (CID)?

A.

Hosts Management

B.

API Clients and Keys

C.

Sensor Dashboard

D.

Sensor Downloads

Full Access
Question # 38

To enhance your security, you want to detect and block based on a list of domains and IP addresses. How can you use IOC management to help this objective?

A.

Blocking of Domains and IP addresses is not a function of IOC management. A Custom IOA Rule should be used instead

B.

Using IOC management, import the list of hashes and IP addresses and set the action to Detect Only

C.

Using IOC management, import the list of hashes and IP addresses and set the action to Prevent/Block

D.

Using IOC management, import the list of hashes and IP addresses and set the action to No Action

Full Access
Question # 39

Which of the following options is a feature found ONLY with the Sensor-based Machine Learning (ML)?

A.

Next-Gen Antivirus (NGAV) protection

B.

Adware and Potentially Unwanted Program detection and prevention

C.

Real-time offline protection

D.

Identification and analysis of unknown executables

Full Access
Question # 40

Which of the following controls the speed in which your sensors will receive automatic sensor updates?

A.

Maintenance Tokens

B.

Sensor Update Policy

C.

Sensor Update Throttling

D.

Channel File Update Throttling

Full Access
Question # 41

Which role will allow someone to manage quarantine files?

A.

Falcon Security Lead

B.

Detections Exceptions Manager

C.

Falcon Analyst – Read Only

D.

Endpoint Manager

Full Access
Question # 42

Where should you look to find the history of the successes and failures for any Falcon Fusion workflows?

A.

Workflow Execution log

B.

Falcon Ul Audit Trail

C.

Workflow Audit log

D.

Custom Alert History

Full Access
Question # 43

You have an existing workflow that is triggered on a critical detection that sends an email to the escalation team. Your CISO has asked to also be notified via email with a customized message. What is the best way to update the workflow?

A.

Clone the workflow and replace the existing email with your CISO's email

B.

Add a sequential action to send a custom email to your CISO

C.

Add a parallel action to send a custom email to your CISO

D.

Add the CISO's email to the existing action

Full Access
Question # 44

You have a new patch server that should be reachable while hosts in your environment are network contained. The server's IP address is static and does not change. Which of the following is the best approach to updating the Containment Policy to allow this?

A.

Add an allowlist entry for the individual server's MAC address

B.

Add an allowlist entry containing the host group that the server belongs to

C.

Add an allowlist entry for the individual server's IP address

D.

Add an allowlist entry containing CIDR notation for the /24 network the server belongs to

Full Access
Question # 45

Once an exclusion is saved, what can be edited in the future?

A.

All parts of the exclusion can be changed

B.

Only the selected groups and hosts to which the exclusion is applied can be changed

C.

Only the options to "Detect/Block" and/or "File Extraction" can be changed

D.

The exclusion pattern cannot be changed

Full Access