Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CrowdStrike Certified Falcon Responder

Last Update 17 hours ago Total Questions : 181

The CrowdStrike Certified Falcon Responder content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include CCFR-201b practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CCFR-201b exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CCFR-201b sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CrowdStrike Certified Falcon Responder practice test comfortably within the allotted time.

Question # 31

You are reviewing the raw data in an event search from a detection tree. You find a FileOpenlnfo event and want to find out if any other files were opened by the responsible process. Which two field values do you need from this event to perform a Process Timeline search?

A.

ParentProcessld_decimal and aid

B.

ResponsibleProcessld_decimal and aid

C.

ContextProcessld_decimal and aid

D.

TargetProcessld_decimal and aid

Question # 32

What is an advantage of using a Process Timeline?

A.

Process related events can be filtered to display specific event types

B.

Suspicious processes are color-coded based on their frequency and legitimacy over time

C.

Processes responsible for spikes in CPU performance are displayed overtime

D.

A visual representation of Parent-Child and Sibling process relationships is provided

Question # 33

Which of the following is an example of a MITRE ATT AND CK tactic?

A.

Eternal Blue

B.

Defense Evasion

C.

Emotet

D.

Phishing

Question # 34

To track the relationship between a parent and its child, Falcon uses specific ID fields. What raw data is used as the 'ParentProcessId_decimal' when a process spawns a child process?

A.

The Operating System PID of the parent.

B.

The TargetProcessId_decimal of the parent process.

C.

The ContextProcessId_decimal of the system.

D.

The RootProcessId_decimal of the entire tree.

Question # 35

A responder needs to find a specific sequence of network connections that did not trigger a detection. Which search tool allows them to search for anything within the raw telemetry?

A.

Host Search

B.

Event Search

C.

Hash Search

D.

User Search

Question # 36

A responder is analyzing a process tree where a suspicious executable is listed as a direct child of services.exe. In this scenario, which source is most likely responsible for the execution?

A.

An interactive user login via RDP.

B.

A Windows Service or a process launched by the Service Control Manager.

C.

A web browser download initiated by the end user.

D.

A script executed directly from a removable USB drive.

Question # 37

A responder is focused on a specific malicious script and wants to see everything that the script's process did. Which timeline is the best tool for this task?

A.

Host Timeline

B.

Process Timeline

C.

User Timeline

D.

Administrative Timeline

Question # 38

What action is used when you want to save a prevention hash for later use?

A.

Always Block

B.

Never Block

C.

Always Allow

D.

No Action

Question # 39

When navigating the main 'Detections' page, several filters are available in the dropdown menu. Which of the following is NOT a filter available in this menu?

A.

Severity

B.

Tactic

C.

Location tag

D.

Status

Question # 40

What does the Full Detection Details option provide?

A.

It provides a visualization of program ancestry via the Process Tree View

B.

It provides a visualization of program ancestry via the Process Activity View

C.

It provides detailed list of detection events via the Process Table View

D.

It provides a detailed list of detection events via the Process Tree View

Go to page: