Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CrowdStrike > CrowdStrike Falcon Certification Program > CCFA-200b

CCFA-200b CrowdStrike Falcon Certification Program Question and Answers

Question # 4

A member of your SECOPS team is building custom scripts for RTR, but they are unable to save or share them in Falcon. What additional role do they need?

A.

Real Time Response - Active Responder

B.

Real Time Response - Administrator

C.

Workflow Author

D.

Falcon Scripts Manager

Full Access
Question # 5

What are the components that must be allowed to manually install Falcon Sensor on macOS?

A.

Network filter extension and Full Disk Access only

B.

Full Disk Access and System extension only

C.

Network filter extension and System extension only

D.

System extension, Full Disk Access, and Network filter extension

Full Access
Question # 6

After successfully installing Falcon on a new employee’s laptop, you notice that the machine is assigned the default prevention policy instead of the custom prevention policy you created. You verify that the Falcon sensor is functioning properly, and you confirm that the custom policy is enabled and successfully running on more than 1,000 other Falcon hosts. What is the likely cause of this issue?

A.

Falcon requires a 24-hour waiting period to apply custom policies to newly installed hosts

B.

A host-based firewall rule is preventing the custom policy from applying successfully

C.

The laptop is not a member of a host group assigned to the custom policy

D.

A prompt to apply the new prevention policy was manually declined

Full Access
Question # 7

How are sensor updates managed and enforced across multiple hosts in Falcon?

A.

Prevention policies assigned to host groups

B.

Manual updates on each host

C.

Sensor update policies assigned to host groups

D.

Direct installation

Full Access
Question # 8

Which report provides a filterable high-level overview of host information such as OS version, Device Type and Machine Domain, and also provides an active sensor heat map for a quick environment review?

A.

Sensor Status Report

B.

Sensor Report

C.

Sensor Overview Report

D.

Sensor Policy Daily Report

Full Access
Question # 9

Your organization has determined that your cybersecurity architect needs to be notified via email whenever Falcon generates detections of a medium severity or higher. Additionally, the architect should be notified about any incidents with a CrowdScore of 1.0 or higher. What can the Falcon Administrator do to ensure the architect is properly alerted?

A.

Create a new Falcon user for the architect then create and assign a custom Falcon user role so they are automatically notified for the new detections and emails

B.

Create a custom Fusion SOAR workflow to send an email every time a new detection or incident is created

C.

Add the architect’s email address to the manage list for detection and incident emails from the General settings menu

D.

Create a new Falcon user for the architect and assign the Detections and Exceptions Manager role so they are automatically notified for the new detections and incidents

Full Access
Question # 10

What is the recommended approach for managing host groups over time?

A.

Create separate groups for each department

B.

Create groups based on IP ranges

C.

Maintain multiple overlapping host groups

D.

Minimize the number of groups

Full Access
Question # 11

Which setting inside the Sensor Update Policy prevents unauthorized uninstallation?

A.

Installation and Maintenance Protection

B.

Sensor Version Control Protection

C.

Uninstall and Maintenance Protection

D.

Update and Management Protection

Full Access
Question # 12

What is the highest level of protection for a prevention policy?

A.

Phase 1

B.

Phase 2

C.

Phase 3

Full Access
Question # 13

What best describes the relationship between Sensor Update policies and Operating Systems?

A.

A Sensor Update policy must be configured for each Operating System (Windows, Mac, Linux)

B.

Sensor Update polices are not Operating System specific; one policy can be applied to all Operating Systems

C.

Windows has its own Sensor Update polices; Mac and Linux share Sensor Update policies

D.

Windows and Mac share Sensor Update policies; Linux requires its own set of polices based on the different kernel versions

Full Access
Question # 14

You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?

A.

Create an Event trigger workflow that triggers on an EPP Detection with an action to assign the detection to yourself

B.

Create an Event trigger workflow that triggers on an EPP Detection with conditions looking for the desired hostname

C.

Create an alert on usage of the tools and assign the alerts to you automatically via workflow

D.

Create an IOC for the host to trigger associated detections and assign them to you via workflow

Full Access
Question # 15

A Falcon Administrator is unable to initiate a Real-Time Response (RTR) session. What is the most likely cause?

A.

The domain controller is preventing the connection

B.

The host has a user logged into it

C.

There is another analyst connected into it

D.

They do not have an RTR role assigned to them

Full Access
Question # 16

You are tasked with creating a “Workstations” host group to encompass all workstations in your environment. Which dynamic grouping criteria will most efficiently accomplish this task?

A.

OU Workstation

B.

Grouping Tags Workstation

C.

Type: Workstation

D.

Platform Windows

Full Access
Question # 17

What type of information is provided in sensor health report?

A.

User login history

B.

Local performance metrics

C.

Current operational status

D.

Network traffic patterns

Full Access
Question # 18

A new prevention policy has been created for assignment to the group named “Servers”. When you try to apply the policy, the “Servers” group is not available. What is the most likely reason the group is not available?

A.

The “Servers” group must be disabled first

B.

The “Servers” group already has a prevention policy applied to it

C.

Host type was not defined correctly within the prevention policy

D.

The new prevention policy should be enabled first

Full Access
Question # 19

After enabling an IOA rule and its respective rule group, what else must be done for an IOA to be fully functional?

A.

The rule must be manually triggered

B.

Hosts must be individually selected to apply to the rule

C.

The rule group must be assigned to a prevention policy

Full Access
Question # 20

When would the No Action option be assigned to a hash in IOC Management?

A.

When you want to save the indicator for later action, but do not want to block or allow it at this time

B.

There is no such option as No Action available in the Falcon console

C.

When you want to add the indicator to your allowlist, but not detect it

D.

When you want to add the indicator to your blocklist and show it as a detection

Full Access
Question # 21

In addition to Host Groups, what other groups can a prevention policy be applied to?

A.

Operating System Groups

B.

Machine Learning Groups

C.

Custom IOA Rule Groups

D.

Custom IOC Groups

Full Access
Question # 22

Your leadership wants controls in place for immediate action on any Overwatch detections. What should you do to ensure the host is contained quickly and notifies the appropriate staff?

A.

Create a Fusion SOAR workflow to contain the host and email the Overwatch team

B.

Create a Fusion SOAR workflow to create a detection for Overwatch and email the SOC team

C.

Create a Fusion SOAR workflow to trigger on an Overwatch detection and set it to block the detection

D.

Create a Fusion SOAR workflow using the Overwatch playbook to contain the host and email the SOC team

Full Access
Question # 23

Which default user role will allow you to see all analyst session details?

A.

Falcon Security Lead

B.

Real Time Response - Read-Only Analyst

C.

Falcon Administrator

D.

Real Time Response - Administrator

Full Access
Question # 24

Your incident responder team is migrating existing workflows into Fusion SOAR workflows so that they execute natively in Falcon. The workflow imports are failing. What format must the workflows be in order to successfully import them into Fusion SOAR?

A.

YAML

B.

CSV

C.

SOAR

D.

JSON

Full Access
Question # 25

What default user role can manage API credentials?

A.

Falcon Security Lead

B.

Falcon Administrator

C.

Falcon API Manager

D.

Endpoint Manager

Full Access
Question # 26

During a Windows system investigation via Real Time Response, an RTR Active Responder is unable to execute a custom PowerShell script for finding specific system artifacts. What is likely restricting the responder from executing the PowerShell script?

A.

Put-and-Run is not enabled in the response policy

B.

Custom Scripts is not enabled in the response policy

C.

Script-Based Execution Monitoring is not enabled in the prevention policy

D.

The responder requires the RTR Administrator role

Full Access
Question # 27

You are deploying the Falcon sensor to 500 hosts. Hosts in an Organizational Unit need a specific exclusion that was previously identified. This OU is expected to add members over the next quarter. What is the best way to create a host group for this OU?

A.

Create a Dynamic Group targeting Windows 10 OS in the domain

B.

Create a dynamic group with an assignment rule that excludes the OU

C.

Create a dynamic group with an assignment rule that filters for the OU

Full Access
Question # 28

What prevention policy settings must be enabled to quarantine files on the host?

A.

Quarantine Files; Windows Anti-Malware Execution Blocking

B.

Malware Protection; Custom Execution Blocking

C.

Next-Gen Antivirus Prevention sliders; Quarantine & Security Center Registration

D.

Advanced Remediation Actions; Quarantine level set to Aggressive

Full Access
Question # 29

How can you search for multiple hostnames at the same time via Host Management?

A.

Enter the multiple hostnames in the Hostname filter separating each by a comma

B.

Add the Hostname filter multiple times and enter separate hostnames into each filter

C.

Enter the multiple hostnames in the Hostname filter separating each by a decimal

D.

Add the Multiple Hostnames filter and enter your list of hostnames

Full Access
Question # 30

Which Windows prevention policy setting monitors contents of shells for execution of malicious content?

A.

Script-based execution visibility

B.

Suspicious Scripts and Commands

C.

Enhanced exploitation visibility

D.

Additional user mode data visibility

Full Access