Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CrowdStrike Certified Falcon Responder

Last Update 19 hours ago Total Questions : 181

The CrowdStrike Certified Falcon Responder content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include CCFR-201b practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCFR-201b exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCFR-201b sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CrowdStrike Certified Falcon Responder practice test comfortably within the allotted time.

Question # 11

CrowdScore is a metric used to identify the severity of an ongoing incident. What percentage of increase in a CrowdScore is considered a strong indication of a coordinated attack?

A.

10%

B.

20%

C.

50%

D.

100%

Question # 12

Which of the following sentences best describes the primary objective of 'Real-time Analysis' within the Falcon platform?

A.

Analyzing historical logs from the past 90 days to find missed threats.

B.

Investigating incoming telemetry in real time or on a near real-time basis to catch active threats.

C.

Scanning every file on a hard drive once per week for dormant viruses.

D.

Manually updating the Falcon sensor on every machine in the fleet.

Question # 13

Filtering is essential for managing a high volume of alerts. Which of the following filters is available by default within the 'Endpoint Detections' dashboard to help narrow down specific threats?

A.

Triggering File

B.

Hardware BIOS Version

C.

Local Subnet Mask

D.

Sensor Update Policy Name

Question # 14

When a responder needs to take data out of the Falcon console for external analysis, which of the following is NOT an option when exporting searches?

A.

CSV

B.

JSON

C.

PDF

D.

Gzip

Question # 15

When a responder chooses to 'Release' a file from quarantine because it was determined to be a false positive, what type of allowlist is automatically created in the background?

A.

Filename-based allowlist

B.

Hash-based allowlist

C.

Path-based allowlist

D.

Command-line allowlist

Question # 16

What is the difference between a Host Search and a Host Timeline?

A.

Results from a Host Search return information in an organized view by type, while a Host Timeline returns a view of all events recorded by the sensor

B.

A Host Timeline only includes process execution events and user account activity

C.

Results from a Host Timeline include process executions and related events organized by data type. A Host Search returns a temporal view of all events for the given host

D.

There is no difference - Host Search and Host Timeline are different names for the same search page

Question # 17

Which of the following statements about the 'Hash Search' (Single Search) is TRUE?

A.

It can search for both files and registry keys simultaneously.

B.

It identifies the geographical location of the file's creator.

C.

The 'Hash Written History' section is only available for SHA256 hashes.

D.

It is primarily used to isolate a host from the network.

Question # 18

In the 'Graph View' of a detection, processes are connected by arrows. Which of the following does a yellow arrow connecting two processes indicate?

A.

A standard Parent-Child relationship.

B.

A Network connection was established between the two processes.

C.

A Thread Injector-Injectee relationship (Process Injection).

D.

A file was written by the first process and read by the second.

Question # 19

A list of managed and unmanaged neighbors for an endpoint can be found:

A.

by using Hosts page in the Investigate tool

B.

by reviewing "Groups" in Host Management under the Hosts page

C.

under "Audit" by running Sensor Visibility Exclusions Audit

D.

only by searching event data using Event Search

Question # 20

What does pivoting to an Event Search from a detection do?

A.

It gives you the ability to search for similar events on other endpoints quickly

B.

It takes you to the raw Insight event data and provides you with a number of Event Actions

C.

It takes you to a Process Timeline for that detection so you can see all related events

D.

It allows you to input an event type, such as DNS Request or ASEP write, and search for those events within the detection

Go to page: