Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CrowdStrike Certified Falcon Responder

Last Update 17 hours ago Total Questions : 181

The CrowdStrike Certified Falcon Responder content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include CCFR-201b practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCFR-201b exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCFR-201b sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CrowdStrike Certified Falcon Responder practice test comfortably within the allotted time.

Question # 21

From a detection, what is the fastest way to see children and sibling process information?

A.

Select the Event Search option. Then from the Event Actions, select Show Associated Event Data (From TargetProcessld_decimal)

B.

Select Full Detection Details from the detection

C.

Right-click the process and select "Follow Process Chain"

D.

Select the Process Timeline feature, enter the AID. Target Process ID, and Parent Process ID

Question # 22

How long are quarantined files stored in the CrowdStrike Cloud?

A.

45 Days

B.

90 Days

C.

Days

D.

Quarantined files are not deleted

Question # 23

The MITRE-Based Falcon Detections Framework is a core component of the Falcon UI. What is the primary operational advantage provided by this framework to a Tier 1 responder?

A.

It allows for the automated decryption of files affected by ransomware.

B.

It provides a standardized view of the attack lifecycle to help understand adversary behavior.

C.

It enables the sensor to block kernel-level drivers from unknown publishers.

D.

It provides a real-time count of the total number of files on the endpoint.

Question # 24

Which of the following tactic and technique combinations is sourced from MITRE ATT AND CK information?

A.

Falcon Intel via Intelligence Indicator - Domain

B.

Machine Learning via Cloud-Based ML

C.

Malware via PUP

D.

Credential Access via OS Credential Dumping

Question # 25

A responder releases a file from quarantine on a specific workstation. What is the default scope of the allowlist that is created during this process?

A.

Global (applies to all hosts in the environment)

B.

Only the specific host where the file was originally quarantined

C.

All hosts within the same host group as the source host

D.

All hosts running the same operating system version

Question # 26

The Falcon console is divided into several modules. Timelines (Host and Process) are technically a part of which Falcon page?

A.

Activity

B.

Investigate

C.

Configuration

D.

Dashboards

Question # 27

The primary purpose for running a Hash Search is to:

A.

determine any network connections

B.

review the processes involved with a detection

C.

determine the origin of the detection

D.

review information surrounding a hash's related activity

Question # 28

Which of the following sentences best describes the primary use of the 'Hash Executions' Search (Bulk Search)?

A.

It allows a responder to upload a file to the cloud for detonating in a sandbox.

B.

It allows for a summary view of the environment-wide presence of a given list of multiple hashes.

C.

It allows an administrator to block a single hash across all machines.

D.

It provides a detailed process tree for every execution of a single hash.

Question # 29

A responder is looking at event telemetry and sees an event named 'ProcessRollup2'. Which sentence best describes what this event type represents?

A.

An existing process was terminated by the user.

B.

A new process was created and started on the endpoint.

C.

A process successfully established a network connection.

D.

A process modified a sensitive registry key.

Question # 30

Detections in Falcon are classified by their origin. Which of the following is NOT a recognized type of detection?

A.

Machine Learning

B.

Behavioral

C.

Intelligence

D.

Custom IOA

Go to page: