Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CrowdStrike Falcon Certification Program

Last Update 3 hours ago Total Questions : 100

The CrowdStrike Falcon Certification Program content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include CCFA-200b practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCFA-200b exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCFA-200b sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CrowdStrike Falcon Certification Program practice test comfortably within the allotted time.

Question # 21

When creating your own Fusion SOAR workflow based on an Event trigger, which additional option will refine the trigger?

A.

Condition

B.

Parameter

C.

Filter

D.

Trigger Details

Question # 22

What are the three required parts of a Fusion SOAR workflow condition?

A.

Operator, value, and source

B.

Alert, action, and schedule

C.

Trigger, parameter, and alert

D.

Parameter, operator, and value

Question # 23

What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?

A.

Host Modification Protection

B.

System Configuration Protection

C.

Sensor Tampering Protection

D.

Sensor Modification Protection

Question # 24

You are deploying the Falcon sensor to 500 hosts. Hosts in an Organizational Unit need a specific exclusion that was previously identified. This OU is expected to add members over the next quarter. What is the best way to create a host group for this OU?

A.

Create a Dynamic Group targeting Windows 10 OS in the domain

B.

Create a dynamic group with an assignment rule that excludes the OU

C.

Create a dynamic group with an assignment rule that filters for the OU

Question # 25

What prevention policy settings must be enabled to quarantine files on the host?

A.

Quarantine Files; Windows Anti-Malware Execution Blocking

B.

Malware Protection; Custom Execution Blocking

C.

Next-Gen Antivirus Prevention sliders; Quarantine & Security Center Registration

D.

Advanced Remediation Actions; Quarantine level set to Aggressive

Question # 26

An inactive host does not contact the Falcon cloud. What is the default number of days after which it is automatically removed from the Host Management page?

A.

30 Days

B.

90 Days

C.

45 Days

Question # 27

Your organization has determined that your cybersecurity architect needs to be notified via email whenever Falcon generates detections of a medium severity or higher. Additionally, the architect should be notified about any incidents with a CrowdScore of 1.0 or higher. What can the Falcon Administrator do to ensure the architect is properly alerted?

A.

Create a new Falcon user for the architect then create and assign a custom Falcon user role so they are automatically notified for the new detections and emails

B.

Create a custom Fusion SOAR workflow to send an email every time a new detection or incident is created

C.

Add the architect’s email address to the manage list for detection and incident emails from the General settings menu

D.

Create a new Falcon user for the architect and assign the Detections and Exceptions Manager role so they are automatically notified for the new detections and incidents

Question # 28

Your development team is working on a new enterprise application, but Falcon starts creating alerts during testing. The alert points to “C:\Users\Bob\DevCode\felix.dll”. In the detection, you see that it is triggering only on a specific Falcon IOA. What would be the best course of action for this situation?

A.

Create an IOA exclusion for “C:\Users\Bob\DevCode\felix.dll”

B.

Create a Custom IOC and set it to “Allow” for “C:\Users\Bob\DevCode\felix.dll”

C.

Manually turn off the built-in IOA through prevention policies

D.

Create a sensor visibility exclusion for “C:\Users\Bob\DevCode\felix.dll”

Question # 29

What is the recommended approach for managing host groups over time?

A.

Create separate groups for each department

B.

Create groups based on IP ranges

C.

Maintain multiple overlapping host groups

D.

Minimize the number of groups

Go to page: