Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the CrowdStrike Falcon Certification Program CCFA-200b Questions and answers with Dumpstech

Exam CCFA-200b Premium Access

View all detail and faqs for the CCFA-200b exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is the purpose of the Machine-Learning Prevention Monitoring Audit Log?

Options:

A.

It is the dashboard used by an analyst to view all items quarantined and to release any items deemed non-malicious

B.

It is the dashboard used to see machine-learning preventions, and it is used to identify spikes in activity and possible targeted attacks

C.

It is designed to show malicious processes that would have been blocked in your environment based on different Machine-Learning Prevention settings

D.

It is designed to give an administrator a quick overview of machine-learning aggressiveness settings as well as the numbers of items actually quarantined

Questions # 12:

After enabling an IOA rule and its respective rule group, what else must be done for an IOA to be fully functional?

Options:

A.

The rule must be manually triggered

B.

Hosts must be individually selected to apply to the rule

C.

The rule group must be assigned to a prevention policy

Questions # 13:

In addition to Host Groups, what other groups can a prevention policy be applied to?

Options:

A.

Operating System Groups

B.

Machine Learning Groups

C.

Custom IOA Rule Groups

D.

Custom IOC Groups

Questions # 14:

You have 100 hashes that have been prohibited by management and need to be blocked within your organization. Using Falcon, what is the best way to accomplish this?

Options:

A.

Navigate to Configure > IOC Management. Add a custom IOC. Add the list of hashes. Set the action to Block. Verify the prevention policy includes Custom Blocking under Execution Blocking.

B.

Navigate to Configure > Prevention policies. Add an IOC Policy. Add the list of hashes as CSV file. Set the action to Block. Verify Custom Execution Blocking is active.

C.

Navigate to Configure > IOC Management. Add a custom Prevention Policy. Add the list of hashes. Set the action to Block. Verify the policy includes Custom Execution Blocking.

D.

Navigate to Configure > Prevention policies. Add an IOC Policy. Add the list of hashes as CSV file. Set the action to Block and Alert. Verify Custom Blocking inside Execution Blocking is active.

Questions # 15:

Which report provides a filterable high-level overview of host information such as OS version, Device Type and Machine Domain, and also provides an active sensor heat map for a quick environment review?

Options:

A.

Sensor Status Report

B.

Sensor Report

C.

Sensor Overview Report

D.

Sensor Policy Daily Report

Questions # 16:

What is true about the Default Sensor Policy?

Options:

A.

It tests the sensor configuration settings before deployment

B.

It is applied automatically if no other Sensor Policies are applied

C.

It can be used to reset all sensor settings to Default

D.

It is a mechanism to deploy the oldest supported version of the Falcon Sensor

Questions # 17:

A member of your SECOPS team is building custom scripts for RTR, but they are unable to save or share them in Falcon. What additional role do they need?

Options:

A.

Real Time Response - Active Responder

B.

Real Time Response - Administrator

C.

Workflow Author

D.

Falcon Scripts Manager

Questions # 18:

You are tasked with creating a group for hosts running Windows 10. What kind of group should you create to make sure all applicable hosts are included in your environment?

Options:

A.

Create a static group with the assignment rule criteria set to OS Type Workstation

B.

Create a dynamic group with the assignment rule criteria set to OS Type Workstation

C.

Create a static group with the assignment rule criteria for OS Version set to Windows 10

D.

Create a dynamic group with the assignment rule criteria for OS Version set to Windows 10

Questions # 19:

What policy setting should be selected for a new host when it has an existing antivirus?

Options:

A.

Extra Aggressive Level ML

B.

Aggressive Level ML

C.

Moderate Level ML

D.

Cautious Level ML

Questions # 20:

What information can be found in the Real Time Response (RTR) Audit Log?

Options:

A.

IP Address, Prevention Policy, recent detections, and host group assignment

B.

Session end time, command return results, and file activity

C.

Session start time, duration, user, hostname, commands used, and retrieved files

D.

Real Time Response (RTR) information is not collected via audit logs

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions