Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CrowdStrike Certified Falcon Administrator CCFA-200 Questions and answers with ValidTests

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the follow should be used with extreme caution because it may introduce additional security risks such as malware or other attacks which would not be recorded, detected, or prevented based on the exclusion syntax?

Options:

A.

Sensor Visibility Exclusion

B.

Machine Learning Exclusions

C.

IOC Exclusions

D.

IOA Exclusions

Expert Solution
Questions # 2:

Which of the following pages provides a count of sensors in Reduced Functionality Mode (RFM) by Operating System?

Options:

A.

Support and resources

B.

Activity Overview

C.

Hosts Overview

D.

Sensor Health

Expert Solution
Questions # 3:

Why is it important to know your company's event data retention limits in the Falcon platform?

Options:

A.

This is not necessary; you simply select "All Time" in your query to search all data

B.

You will not be able to search event data into the past beyond your retention period

C.

Data such as process records are kept for a shorter time than event data

D.

Your query will require you to specify the data pool associated with the date you wish to search

Expert Solution
Questions # 4:

Which of the following is a valid step when troubleshooting sensor installation failure?

Options:

A.

Confirm all required services are running on the system

B.

Enable the Windows firewall

C.

Disable SSL and TLS on the host

D.

Delete any available application crash log files

Expert Solution
Questions # 5:

Where should you look to find the history of the successes and failures for any Falcon Fusion workflows?

Options:

A.

Workflow Execution log

B.

Falcon Ul Audit Trail

C.

Workflow Audit log

D.

Custom Alert History

Expert Solution
Questions # 6:

Which of the following uses Regex to create a detection or take a preventative action?

Options:

A.

Custom IOC

B.

Machine Learning Exclusion

C.

Custom IOA

D.

Sensor Visibility Exclusion

Expert Solution
Questions # 7:

If a user wanted to install an older version of the Falcon sensor, how would they find the older installer file?

Options:

A.

Older versions of the sensor are not available for download

B.

By emailing CrowdStrike support at support@crowdstrike.com

C.

By installing the current sensor and clicking the "downgrade" button during the install

D.

By clicking on "Older versions" links under the Host setup and management > Deploy > Sensor downloads

Expert Solution
Questions # 8:

Which option best describes the general process Whereinstallation of the Falcon Sensor on MacOS?

Options:

A.

Grant the Falcon Package Full Disk Access, install the Falcon package, use falconctl to license the sensor

B.

Install the Falcon package passing it the installation token in the command line

C.

Install the Falcon package, use falconctl to license the sensor, approve the system extension, grant the sensor Full Disk Access

D.

Grant the Falcon Package Full Disk Access, install the Falcon package, load the Falcon Sensor with the command 'falconctl stats'

Expert Solution
Questions # 9:

Why is it critical to have separate sensor update policies for Windows/Mac/*nix?

Options:

A.

There may be special considerations for each OS

B.

To assist with testing and tracking sensor rollouts

C.

The network protocols are different for each host OS

D.

It is an auditing requirement

Expert Solution
Questions # 10:

What should be disabled on firewalls so that the sensor's man-in-the-middle attack protection works properly?

Options:

A.

Deep packet inspection

B.

Linux Sub-System

C.

PowerShell

D.

Windows Proxy

Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions