Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the CrowdStrike CCFH CCFH-202b Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CCFH-202b Premium Access

View all detail and faqs for the CCFH-202b exam


389 Students Passed

94% Average Score

90% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An attacker created a scheduled task which executes a remote management application. Which MITRE ATT & CK Matrix for Enterprise stage is this an example of?

Options:

A.

Persistence

B.

Lateral Movement

C.

Privilege Escalation

D.

Gaining Access

Questions # 2:

Refer to the image.

Question # 2

What aggregate function in the CrowdStrike Query Language (CQL) was used to provide the filtered results?

Options:

A.

eval

B.

groupBy

C.

table

D.

stats

Questions # 3:

An independent investigation team based in Europe asks for the Event Search data to be formatted to Central European Summer Time (CEST). Which parameter within the formatTime() function is required to convert the Unix timestamps?

Options:

A.

unit

B.

locale

C.

format

D.

timezone

Questions # 4:

What is the purpose of this query?

#event_simpleName=UserLogon LogonType=10 RemoteAddressIP4=* | !cidr(RemoteAddressIP4, subnet=["224.0.0.0/4", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "127.0.0.0/8", "169.254.0.0/16", "0.0.0.0/32"]) | ipLocation(RemoteAddressIP4) | worldMap(ip=RemoteAddressIP4, magnitude=count(aid))

Options:

A.

Display all locations for local subnets on a map

B.

Display all users who are logging in from private IP ranges on a map

C.

Display geolocation data for all network logins on a map

D.

Display geolocation data for RDP connections on a map

Questions # 5:

Which pre-defined reports will show activities that typically indicate suspicious activity occurring on a system?

Options:

A.

Sensor reports

B.

Timeline reports

C.

Scheduled searches

D.

Hunt reports

Questions # 6:

Which CQL query would output relevant data in tracking USB storage device usage?

Options:

A.

#event_simpleName=RemovableMediaVolumeMounted | table([@timestamp, ComputerName, VolumeDriveLetter, VolumeFileSystemDevice, VolumeFileSystemDriver])

B.

#event_simpleName=RemovableMediaVolumeMounted | table([RemoteAddressIP4, UserName, ParentProcessId, RawProcessId, TargetProcessId, FileName, MD5HashData, SHA256HashData, aid, cid])

C.

#event_simpleName=ProcessRollup2 event_platform=Win | table(["Host Name", "Connection Type", "Manufacturer", "Product Name", "Description", "Device ID", Time])

D.

#event_simpleName=FsVolumeMounted | table([@source, ComputerName, VolumeName, VolumeFileSystemType, Entitlements, VolumeDriveLetter])

Questions # 7:

You are investigating a compromise on a Linux host. You suspect that the host is running an older version of Apache and that the Log4j (CVE-2021-44228) vulnerability is being exploited using JNDI lookups. Which CQL query could you use to determine if Log4j is the root cause of the compromise?

Options:

A.

ExternalApiType=Event_DetectionSummaryEvent DetectionDescription=/log4j/i

B.

#event_simpleName=HttpRequest | HttpRequestHeader=/.*jndi:\w{1,5}:?\}?\/\/.*\)/i

C.

#event_simpleName=Cve-Detection | Cve-Number="CVE-2021-44228"

D.

#event_simpleName=ScriptControlDetectInfo ScriptContent=/.*jndi:\w{1,5}:?\}?\/\/.*\}/i

Questions # 8:

Which statement will filter for all events that correspond to a new scheduled task registered by the user "Doris"?

Options:

A.

#event_simpleName=ProcessRollup2 FileName="*.sht" | UserName="Doris"

B.

#event_simpleName=ScheduledTaskRegistered | UserName="Doris"

C.

#event_simpleName=ProcessRollup2 ProcessName="taskmgr.exe" | UserName="Doris"

D.

#event_simpleName=NewScheduledTaskRegistered | UserName="Doris"

Questions # 9:

What can a hunter add at the end of a search string in Advanced Event Search to identify outliers when quantifying the results?

Options:

A.

| groupBy()

B.

| eval()

C.

| sample()

D.

| stats()

Questions # 10:

You've experienced a ransomware infection that has spread throughout the enterprise. What is the first step you would take to determine the source of infection?

Options:

A.

Perform a PowerShell hunt to look for suspicious PowerShell commands

B.

Use Advanced Event Search to timeline encryption activity and determine the system with the first encryption event

C.

Utilize Exposure Management to identify systems with critical vulnerabilities that could be exploited

D.

Perform reverse engineering on the malware sample to see if you can find the infection vector

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.