Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CrowdStrike CCFA-200 - CrowdStrike Certified Falcon Administrator

Page: 1 / 5
Total 153 questions

Which of the following pages provides a count of sensors in Reduced Functionality Mode (RFM) by Operating System?

A.

Support and resources

B.

Activity Overview

C.

Hosts Overview

D.

Sensor Health

Which of the following options is a feature found ONLY with the Sensor-based Machine Learning (ML)?

A.

Next-Gen Antivirus (NGAV) protection

B.

Adware and Potentially Unwanted Program detection and prevention

C.

Real-time offline protection

D.

Identification and analysis of unknown executables

What is the goal of a Network Containment Policy?

A.

Increase the aggressiveness of the assigned prevention policy

B.

Limit the impact of a compromised host on the network

C.

Gain more visibility into network activities

D.

Partition a network for privacy

Your organization has a set of servers that are not allowed to be accessed remotely, including via Real Time Response (RTR). You already have these servers in their own Falcon host group. What is the next step to disable RTR only on these hosts?

A.

Edit the Default Response Policy, toggle the "Real Time Response" switch off and assign the policy to the host group

B.

Edit the Default Response Policy and add the host group to the exceptions list under "Real Time Functionality"

C.

Create a new Response Policy, toggle the "Real Time Response" switch off and assign the policy to the host group

D.

Create a new Response Policy and add the host name to the exceptions list under "Real Time Functionality"

Which port and protocol does the sensor use to communicate with the CrowdStrike Cloud?

A.

TCP port 22 (SSH)

B.

TCP port 443 (HTTPS)

C.

TCP port 80 (HTTP)

D.

TCP UDP port 53 (DNS)

What can exclusions be applied to?

A.

Individual hosts selected by the administrator

B.

Either all hosts or specified groups

C.

Only the default host group

D.

Only the groups selected by the administrator

Which of the following is a valid step when troubleshooting sensor installation failure?

A.

Confirm all required services are running on the system

B.

Enable the Windows firewall

C.

Disable SSL and TLS on the host

D.

Delete any available application crash log files

When creating new IOCs in IOC management, which of the following fields must be configured?

A.

Hash, Description, Filename

B.

Hash, Action and Expiry Date

C.

Filename, Severity and Expiry Date

D.

Hash, Platform and Action

Where can you modify settings to permit certain traffic during a containment period?

A.

Prevention Policy

B.

Host Settings

C.

Containment Policy

D.

Firewall Settings

What is the primary purpose of using glob syntax in an exclusion?

A.

To specify a Domain be excluded from detections

B.

To specify exclusion patterns to easily exclude files and folders and extensions from detections

C.

To specify exclusion patterns to easily add files and folders and extensions to be prevented

D.

To specify a network share be excluded from detections