Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CrowdStrike CCFH-202 - CrowdStrike Certified Falcon Hunter

Page: 1 / 2
Total 60 questions

What kind of activity does a User Search help you investigate?

A.

A history of Falcon Ul logon activity

B.

A list of process activity executed by the specified user account

C.

A count of failed user logon activity

D.

A list of DNS queries by the specified user account

A benefit of using a threat hunting framework is that it:

A.

Automatically generates incident reports

B.

Eliminates false positives

C.

Provides high fidelity threat actor attribution

D.

Provides actionable, repeatable steps to conduct threat hunting

Where would an analyst find information about shells spawned by root, Kernel Module loads, and wget/curl usage?

A.

Sensor Health report

B.

Linux Sensor report

C.

Sensor Policy Daily report

D.

Mac Sensor report

Which SPL (Splunk) field name can be used to automatically convert Unix times (Epoch) to UTC readable time within the Flacon Event Search?

A.

utc_time

B.

conv_time

C.

_time

D.

time

Which of the following is an example of a Falcon threat hunting lead?

A.

A routine threat hunt query showing process executions of single letter filename (e.g., a.exe) from temporary directories

B.

Security appliance logs showing potentially bad traffic to an unknown external IP address

C.

A help desk ticket for a user clicking on a link in an email causing their machine to become unresponsive and have high CPU usage

D.

An external report describing a unique 5 character file extension for ransomware encrypted files

The Process Timeline Events Details table will populate the Parent Process ID and the Parent File columns when the cloudable Event data contains which event field?

A.

ContextProcessld_decimal

B.

RawProcessld_decimal

C.

ParentProcessld_decimal

D.

RpcProcessld_decimal

To view Files Written to Removable Media within a specified timeframe on a host within the Host Search page, expand and refer to the _______dashboard panel.

A.

Command Line and Admin Tools

B.

Processes and Services

C.

Registry, Tasks, and Firewall

D.

Suspicious File Activity

What is the difference between a Host Search and a Host Timeline?

A.

Host Search is used for detection investigation and Host Timeline is used for proactive hunting

B.

A Host Search organizes the data in useful event categories like process executions and network connections, a Host Timeline provides an uncategorized view of recorded events in chronological order

C.

You access a Host Search from a detection to show you every recorded process event related to the detection and you can only populate the Host Timeline fields manually

D.

There is no difference. You just get to them different ways

Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?

A.

Installing a backdoor on the victim endpoint

B.

Discovering internet-facing servers

C.

Emailing the intended victim with a malware attachment

D.

Loading a malicious payload into a common DLL

Lateral movement through a victim environment is an example of which stage of the Cyber Kill Chain?

A.

Command & Control

B.

Actions on Objectives

C.

Exploitation

D.

Delivery