Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CrowdStrike CCFR-201 - CrowdStrike Certified Falcon Responder

Page: 1 / 2
Total 60 questions

What is an advantage of using a Process Timeline?

A.

Process related events can be filtered to display specific event types

B.

Suspicious processes are color-coded based on their frequency and legitimacy over time

C.

Processes responsible for spikes in CPU performance are displayed overtime

D.

A visual representation of Parent-Child and Sibling process relationships is provided

After running an Event Search, you can select many Event Actions depending on your results. Which of the following is NOT an option for any Event Action?

A.

Draw Process Explorer

B.

Show a +/- 10-minute window of events

C.

Show a Process Timeline for the responsible process

D.

Show Associated Event Data (from TargetProcessld_decimal or ContextProcessld_decimal)

The Falcon platform will show a maximum of how many detections per day for a single Agent Identifier (AID)?

A.

500

B.

750

C.

1000

D.

1200

How long does detection data remain in the CrowdStrike Cloud before purging begins?

A.

90 Days

B.

45 Days

C.

30 Days

D.

14 Days

You are notified by a third-party that a program may have redirected traffic to a malicious domain. Which Falcon page will assist you in searching for any domain request information related to this notice?

A.

Falcon X

B.

Investigate

C.

Discover

D.

Spotlight

Which Executive Summary dashboard item indicates sensors running with unsupported versions?

A.

Detections by Severity

B.

Inactive Sensors

C.

Sensors in RFM

D.

Active Sensors

You can jump to a Process Timeline from many views, like a Hash Search, by clicking which of the following?

A.

ProcessTimeline Link

B.

PID

C.

UTCtime

D.

Process ID or Parent Process ID

How long are quarantined files stored on the host?

A.

45 Days

B.

30 Days

C.

Quarantined files are never deleted from the host

D.

90 Days

What is the difference between Managed and Unmanaged Neighbors in the Falcon console?

A.

A managed neighbor is currently network contained and an unmanaged neighbor is uncontained

B.

A managed neighbor has an installed and provisioned sensor

C.

An unmanaged neighbor is in a segmented area of the network

D.

A managed sensor has an active prevention policy

You notice that taskeng.exe is one of the processes involved in a detection. What activity should you investigate next?

A.

User logons after the detection

B.

Executions of schtasks.exe after the detection

C.

Scheduled tasks registered prior to the detection

D.

Pivot to a Hash search for taskeng.exe