Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CrowdStrike Falcon Certification Program CCFH-202 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CCFH-202 Premium Access

View all detail and faqs for the CCFH-202 exam


409 Students Passed

94% Average Score

97% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What do you click to jump to a Process Timeline from many pages in Falcon, such as a Hash Search?

Options:

A.

PID

B.

Process ID or Parent Process ID

C.

CID

D.

Process Timeline Link

Questions # 2:

Which field in a DNS Request event points to the responsible process?

Options:

A.

ContextProcessld_readable

B.

TargetProcessld_decimal

C.

ContextProcessld_decimal

D.

ParentProcessId_decimal

Questions # 3:

How do you rename fields while using transforming commands such as table, chart, and stats?

Options:

A.

By renaming the fields with the "rename" command after the transforming command e.g. "stats count by ComputerName | rename count AS total_count"

B.

You cannot rename fields as it would affect sub-queries and statistical analysis

C.

By using the "renamed" keyword after the field name eg "stats count renamed totalcount by ComputerName"

D.

By specifying the desired name after the field name eg "stats count totalcount by ComputerName"

Questions # 4:

The help desk is reporting an increase in calls related to user accounts being locked out over the last few days. You suspect that this could be an attack by an adversary against your organization. Select the best hunting hypothesis from the following:

Options:

A.

A zero-day vulnerability is being exploited on a Microsoft Exchange server

B.

A publicly available web application has been hacked and is causing the lockouts

C.

Users are locking their accounts out because they recently changed their passwords

D.

A password guessing attack is being executed against remote access mechanisms such as VPN

Questions # 5:

Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?

Options:

A.

Installing a backdoor on the victim endpoint

B.

Discovering internet-facing servers

C.

Emailing the intended victim with a malware attachment

D.

Loading a malicious payload into a common DLL

Questions # 6:

Question # 6

Falcon detected the above file attempting to execute. At initial glance; what indicators can we use to provide an initial analysis of the file?

Options:

A.

VirusTotal, Hybrid Analysis, and Google pivot indicator lights enabled

B.

File name, path, Local and Global prevalence within the environment

C.

File path, hard disk volume number, and IOC Management action

D.

Local prevalence, IOC Management action, and Event Search

Questions # 7:

You are reviewing a list of domains recently banned by your organization's acceptable use policy. In particular, you are looking for the number of hosts that have visited each domain. Which tool should you use in Falcon?

Options:

A.

Create a custom alert for each domain

B.

Allowed Domain Summary Report

C.

Bulk Domain Search

D.

IP Addresses Search

Questions # 8:

An analyst has sorted all recent detections in the Falcon platform to identify the oldest in an effort to determine the possible first victim host What is this type of analysis called?

Options:

A.

Visualization of hosts

B.

Statistical analysis

C.

Temporal analysis

D.

Machine Learning

Questions # 9:

Which of the following queries will return the parent processes responsible for launching badprogram exe?

Options:

A.

[search (ParentProcess) where name=badprogranrexe ] | table ParentProcessName _time

B.

event_simpleName=processrollup2 [search event_simpleName=processrollup2 FileName=badprogram.exe | rename ParentProcessld_decimal AS TargetProcessld_decimal | fields aid TargetProcessld_decimal] | stats count by FileName _time

C.

[search (ProcessList) where Name=badprogram.exe ] | search ParentProcessName | table ParentProcessName _time

D.

event_simpleName=processrollup2 [search event_simpleName=processrollup2 FileName=badprogram.exe | rename TargetProcessld_decimal AS ParentProcessld_decimal | fields aid TargetProcessld_decimal] | stats count by FileName _time

Questions # 10:

To find events that are outliers inside a network,___________is the best hunting method to use.

Options:

A.

time-based

B.

machine learning

C.

searching

D.

stacking

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.