CrowdStrike CCFH-202 - CrowdStrike Certified Falcon Hunter
What kind of activity does a User Search help you investigate?
A benefit of using a threat hunting framework is that it:
Where would an analyst find information about shells spawned by root, Kernel Module loads, and wget/curl usage?
Which SPL (Splunk) field name can be used to automatically convert Unix times (Epoch) to UTC readable time within the Flacon Event Search?
Which of the following is an example of a Falcon threat hunting lead?
The Process Timeline Events Details table will populate the Parent Process ID and the Parent File columns when the cloudable Event data contains which event field?
To view Files Written to Removable Media within a specified timeframe on a host within the Host Search page, expand and refer to the _______dashboard panel.
What is the difference between a Host Search and a Host Timeline?
Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?
Lateral movement through a victim environment is an example of which stage of the Cyber Kill Chain?