Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CrowdStrike CCFA-200 CrowdStrike Certified Falcon Administrator Exam Practice Test

Demo: 44 questions
Total 153 questions

CrowdStrike Certified Falcon Administrator Questions and Answers

Question 1

Which of the following tools developed by Crowdstrike is intended to help with removal of the CrowdStrike Windows Falcon Sensor?

Options:

A.

CrowdStrikeRemovalTool.exe

B.

UninstallTool.exe

C.

CSUninstallTool.exe

D.

FalconUninstall.exe

Question 2

What information does the API Audit Trail Report provide?

Options:

A.

A list of analyst login activity

B.

A list of specific changes to prevention policy

C.

A list of actions taken via Falcon OAuth2-based APIs

D.

A list of newly added hosts

Question 3

Which exclusion pattern will prevent detections on a file at C:\Program Files\My Program\My Files\program.exe?

Options:

A.

\Program Files\My Program\My Files\*

B.

\Program Files\My Program\*

C.

*\*

D.

*\Program Files\My Program\*\

Question 4

On which page of the Falcon console would you create sensor groups?

Options:

A.

User management

B.

Sensor update policies

C.

Host management

D.

Host groups

Question 5

How can you find a list of hosts that have not communicated with the CrowdStrike Cloud in the last 30 days?

Options:

A.

Under Dashboards and reports, choose the Sensor Report. Set the "Last Seen" dropdown to 30 days and reference the Inactive Sensors widget

B.

Under Host setup and management, choose the Host Management page. Set the group filter to "Inactive Sensors"

C.

Under Host setup and management > Managed endpoints > Inactive Sensors. Change the time range to 30 days

D.

Under Host setup and management, choose the Disabled Sensors Report. Change the time range to 30 days

Question 6

Why is it critical to have separate sensor update policies for Windows/Mac/*nix?

Options:

A.

There may be special considerations for each OS

B.

To assist with testing and tracking sensor rollouts

C.

The network protocols are different for each host OS

D.

It is an auditing requirement

Question 7

A Falcon Administrator is trying to use Real-Time Response to start a session with a host that has a sensor installed but they are unable to connect. What is the most likely cause?

Options:

A.

The host has a user logged into it

B.

The domain controller is preventing the connection

C.

They do not have an RTR role assigned to them

D.

There is another analyst connected into it

Question 8

You are evaluating the most appropriate Prevention Policy Machine Learning slider settings for your environment. In your testing phase, you configure the Detection slider as Aggressive. After running the sensor with this configuration for 1 week of testing, which Audit report should you review to determine the best Machine Learning slider settings for your organization?

Options:

A.

Prevention Policy Audit Trail

B.

Prevention Policy Debug

C.

Prevention Hashes Ignored

D.

Machine-Learning Prevention Monitoring

Question 9

Which of the following controls the speed in which your sensors will receive automatic sensor updates?

Options:

A.

Maintenance Tokens

B.

Sensor Update Policy

C.

Sensor Update Throttling

D.

Channel File Update Throttling

Question 10

Which of the following is a valid step when troubleshooting sensor installation failure?

Options:

A.

Confirm all required services are running on the system

B.

Enable the Windows firewall

C.

Disable SSL and TLS on the host

D.

Delete any available application crash log files

Question 11

An analyst has reported they are not receiving workflow triggered notifications in the past few days. Where should you first check for potential failures?

Options:

A.

Custom Alert History

B.

Workflow Execution log

C.

Workflow Audit log

D.

Falcon UI Audit Trail

Question 12

What statement is TRUE about managing a user's role?

Options:

A.

The Administrator cannot re-use the account email for a new account

B.

You must have Falcon MFA enabled first

C.

You must be a Falcon Security Lead

D.

You must be a Falcon Administrator

Question 13

You need to have the ability to monitor suspicious VBA macros. Which Sensor Visibility setting should be turned on within the Prevention policy settings?

Options:

A.

Script-based Execution Monitoring

B.

Interpreter-Only

C.

Additional User Mode Data

D.

Engine (Full Visibility)

Question 14

When editing an existing IOA exclusion, what can NOT be edited?

Options:

A.

The IOA name

B.

All parts of the exclusion can be changed

C.

The exclusion name

D.

The hosts groups

Question 15

You are beginning the rollout of the Falcon Sensor for the first time side-by-side with your existing security solution. You need to configure the Machine Learning levels of the Prevention Policy so it does not interfere with existing solutions during the testing phase. What settings do you choose?

Options:

A.

Detection slider: Extra Aggressive

Prevention slider: Cautious

B.

Detection slider: Moderate

Prevention slider: Disabled

C.

Detection slider: Cautious

Prevention slider: Cautious

D.

Detection slider: Disabled

Prevention slider: Disabled

Question 16

You are attempting to install the Falcon sensor on a host with a slow Internet connection and the installation fails after 20 minutes. Which of the following parameters can be used to override the 20-minute default provisioning window?

Options:

A.

ExtendedWindow=1

B.

Timeout=0

C.

ProvNoWait=1

D.

Timeout=30

Question 17

How do you assign a policy to a specific group of hosts?

Options:

A.

Create a group containing the desired hosts using "Static Assignment." Go to the Assigned Host Groups tab of the desired policy and dick "Add groups to policy." Select the desired Group(s).

B.

Assign a tag to the desired hosts in Host Management. Create a group with an assignment rule based on that tag. Go to the Assignment tab of the desired policy and click "Add Groups to Policy." Select the desired Group(s).

C.

Create a group containing the desired hosts using "Dynamic Assignment." Go to the Assigned Host Groups tab of the desired policy and select criteria such as OU, OS, Hostname pattern, etc.

D.

On the Assignment tab of the desired policy, select "Static" assignment. From the next window, select the desired hosts (using fitters if needed) and click Add.

Question 18

When configuring a specific prevention policy, the admin can align the policy to two different types of groups, Host Groups and which other?

Options:

A.

Custom IOA Rule Groups

B.

Custom IOC Groups

C.

Enterprise Groups

D.

Operating System Groups

Question 19

When creating an API client, which of the following must be saved immediately since it cannot be viewed again after the client is created?

Options:

A.

Base URL

B.

Secret

C.

Client ID

D.

Client name

Question 20

Which of the following pages provides a count of sensors in Reduced Functionality Mode (RFM) by Operating System?

Options:

A.

Support and resources

B.

Activity Overview

C.

Hosts Overview

D.

Sensor Health

Question 21

Where do you obtain the Windows sensor installer for CrowdStrike Falcon?

Options:

A.

Sensors are downloaded from the Hosts > Sensor Downloads

B.

Sensor installers are unique to each customer and must be obtained from support

C.

Sensor installers are downloaded from the Support section of the CrowdStrike website

D.

Sensor installers are not used because sensors are deployed from within Falcon

Question 22

A sensor that has not contacted the Falcon cloud will be automatically deleted from the hosts list after how many days?

Options:

A.

45 Days

B.

60 Days

C.

30 Days

D.

90 Days

Question 23

What command should be run to verify if a Windows sensor is running?

Options:

A.

regedit myfile.reg

B.

sc query csagent

C.

netstat -f

D.

ps -ef | grep falcon

Question 24

What would be the most appropriate action to take if you wanted to prevent a folder from being uploaded to the cloud without disabling uploads globally?

Options:

A.

A Machine Learning exclusion

B.

A Sensor Visibility exclusion

C.

An IOA exclusion

D.

A Custom IOC entry

Question 25

Custom IOA rules are defined using which syntax?

Options:

A.

Glob

B.

PowerShell

C.

Yara

D.

Regex

Question 26

Once an exclusion is saved, what can be edited in the future?

Options:

A.

All parts of the exclusion can be changed

B.

Only the selected groups and hosts to which the exclusion is applied can be changed

C.

Only the options to "Detect/Block" and/or "File Extraction" can be changed

D.

The exclusion pattern cannot be changed

Question 27

Which of the following roles allows a Falcon user to create Real Time Response Custom Scripts?

Options:

A.

Real Time Responder – Administrator

B.

Real Time Responder – Read Only Analyst

C.

Real Time Responder – Script Developer

D.

Real Time Responder – Active Responder

Question 28

Which of the following uses Regex to create a detection or take a preventative action?

Options:

A.

Custom IOC

B.

Machine Learning Exclusion

C.

Custom IOA

D.

Sensor Visibility Exclusion

Question 29

You have a new patch server that should be reachable while hosts in your environment are network contained. The server's IP address is static and does not change. Which of the following is the best approach to updating the Containment Policy to allow this?

Options:

A.

Add an allowlist entry for the individual server's MAC address

B.

Add an allowlist entry containing the host group that the server belongs to

C.

Add an allowlist entry for the individual server's IP address

D.

Add an allowlist entry containing CIDR notation for the /24 network the server belongs to

Question 30

Which of the following is NOT an available action for an API Client?

Options:

A.

Edit an API Client

B.

Reset an API Client Secret

C.

Retrieve an API Client Secret

D.

Delete an API Client

Question 31

When uninstalling a sensor, which of the following is required if the 'Uninstall and maintenance protection' setting is enabled within the Sensor Update Policies?

Options:

A.

Maintenance token

B.

Customer ID (CID)

C.

Bulk update key

D.

Agent ID (AID)

Question 32

When creating a custom IOA for a specific domain, which syntax would be best for detecting or preventing on all subdomains as well?

Options:

A.

*\.baddomain\.xyz|baddomain\. xyz

B.

*baddomain\. xyz|baddomain\. xyz. *

C.

Custom IOA rules cannot be created for domains

D.

**baddomain\. xyz|baddomain\. xyz**

Question 33

How many days will an inactive host remain visible within the Host Management or Trash pages?

Options:

A.

45 days

B.

15 days

C.

90 days

D.

120 days

Question 34

Which option best describes the general process Whereinstallation of the Falcon Sensor on MacOS?

Options:

A.

Grant the Falcon Package Full Disk Access, install the Falcon package, use falconctl to license the sensor

B.

Install the Falcon package passing it the installation token in the command line

C.

Install the Falcon package, use falconctl to license the sensor, approve the system extension, grant the sensor Full Disk Access

D.

Grant the Falcon Package Full Disk Access, install the Falcon package, load the Falcon Sensor with the command 'falconctl stats'

Question 35

When a user initiates a sensor installs, where can the logs be found?

Options:

A.

%SYSTEMROOT%\Logs

B.

%SYSTEMROOT%\Temp

C.

%LOCALAPPDATA%\Logs

D.

% LOCALAPP D ATA%\Tem p

Question 36

You want the Falcon Cloud to push out sensor version changes but you also want to manually control when the sensor version is upgraded or downgraded. In the Sensor Update policy, which is the best Sensor version option to achieve these requirements?

Options:

A.

Specific sensor version number

B.

Auto - TEST-QA

C.

Sensor version updates off

D.

Auto - N-1

Question 37

What is the purpose of the Default Sensor Policy?

Options:

A.

A mechanism to deploy the oldest supported version of the Falcon Sensor.

B.

Tests the sensor configuration settings before deployment.

C.

Used to reset all sensor settings to Default.

D.

Acts as a "catch all" policy if no other Sensor Policies are applied.

Question 38

Your organization has a set of servers that are not allowed to be accessed remotely, including via Real Time Response (RTR). You already have these servers in their own Falcon host group. What is the next step to disable RTR only on these hosts?

Options:

A.

Edit the Default Response Policy, toggle the "Real Time Response" switch off and assign the policy to the host group

B.

Edit the Default Response Policy and add the host group to the exceptions list under "Real Time Functionality"

C.

Create a new Response Policy, toggle the "Real Time Response" switch off and assign the policy to the host group

D.

Create a new Response Policy and add the host name to the exceptions list under "Real Time Functionality"

Question 39

Which of the following Machine Learning (ML) sliders will only detect or prevent high confidence malicious items?

Options:

A.

Aggressive

B.

Cautious

C.

Minimal

D.

Moderate

Question 40

Which of the following is an effective Custom IOA rule pattern to kill any process attempting to access www.badguydomain.com?

Options:

A.

.*badguydomain.com.*

B.

\Device\HarddiskVolume2\*.exe -SingleArgument www.badguydomain.com /kill

C.

badguydomain\.com.*

D.

Custom IOA rules cannot be created for domains

Question 41

Why do Sensor Update policies need to be configured for each OS (Windows, Mac, Linux)?

Options:

A.

To bundle the Sensor and Prevention policies together into a deployment package

B.

Sensor Update policies are OS dependent

C.

To assist with auditing and change management

D.

This is false. One policy can be applied to all Operating Systems

Question 42

In order to exercise manual control over the sensor upgrade process, as well as prevent unauthorized users from uninstalling or upgrading the sensor, which settings in the Sensor Update Policy would meet this criteria?

Options:

A.

Sensor version set to N-1 and Bulk maintenance mode is turned on

B.

Sensor version fixed and Uninstall and maintenance protection turned on

C.

Sensor version updates off and Uninstall and maintenance protection turned off

D.

Sensor version set to N-2 and Bulk maintenance mode is turned on

Question 43

What may prevent a user from logging into Falcon via single sign-on (SSO)?

Options:

A.

The SSO username doesn't match their email address in Falcon

B.

The maintenance token has expired

C.

Falcon is in reduced functionality mode

D.

The user never configured their security questions

Question 44

When a host is placed in Network Containment, which of the following is TRUE?

Options:

A.

The host machine is unable to send or receive network traffic outside of the local network

B.

The host machine is unable to send or receive network traffic except to/from the Falcon Cloud and traffic allowed in the Firewall Policy

C.

The host machine is unable to send or receive any network traffic

D.

The host machine is unable to send or receive network traffic except to/from the Falcon Cloud and any resources allowlisted in the Containment Policy

Demo: 44 questions
Total 153 questions