Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CrowdStrike > CrowdStrike Certifications > CCFR-201 > CCFR-201 Online Practice Questions and Answers

CCFR-201 Online Practice Questions and Answers

Questions 4

After pivoting to an event search from a detection, you locate the ProcessRollup2 event. Which two field values are you required to obtain to perform a Process Timeline search so you can determine what the process was doing?

A. SHA256 and TargetProcessld_decimal

B. SHA256 and ParentProcessld_decimal

C. aid and ParentProcessld_decimal

D. aid and TargetProcessld_decimal

Buy Now

Correct Answer: D

According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Process Timeline search requires two parameters: aid (agent ID) and TargetProcessId_decimal (the decimal value of the process ID). These fields can be obtained from the ProcessRollup2 event, which contains information about processes that have executed on a host1.

Questions 5

How long are quarantined files stored on the host?

A. 45 Days

B. 30 Days

C. Quarantined files are never deleted from the host

D. 90 Days

Buy Now

Correct Answer: C

According to the CrowdStrike Falcon?Data Replicator (FDR) Add-on for Splunk Guide, quarantined files are never deleted from the host unless you manually delete them or release them from quarantine2. When you release a file from quarantine, you are restoring it to its original location and allowing it to execute on any host in your organization2. This action also removes the file from the quarantine list and deletes it from the CrowdStrike Cloud2.

Questions 6

A list of managed and unmanaged neighbors for an endpoint can be found:

A. by using Hosts page in the Investigate tool

B. by reviewing "Groups" in Host Management under the Hosts page

C. under "Audit" by running Sensor Visibility Exclusions Audit

D. only by searching event data using Event Search

Buy Now

Correct Answer: A

According to the CrowdStrike Falcon?Data Replicator (FDR) Add-on for Splunk Guide, you can use the Hosts page in the Investigate tool to view information about your endpoints, such as hostname, IP address, OS, sensor version, etc2. You can also see a list of managed and unmanaged neighbors for each endpoint, which are other devices that have communicated with that endpoint over the network2. This can help you identify potential threats or vulnerabilities in your network2.

Questions 7

What happens when a hash is set to Always Block through IOC Management?

A. Execution is prevented on all hosts by default

B. Execution is prevented on selected host groups

C. Execution is prevented and detection alerts are suppressed

D. The hash is submitted for approval to be blocked from execution once confirmed by Falcon specialists

Buy Now

Correct Answer: A

According to the CrowdStrike Falcon?Data Replicator (FDR) Add-on for Splunk Guide, IOC Management allows you to manage indicators of compromise (IOCs), which are artifacts such as hashes, IP addresses, or domains that are associated with malicious activities2. You can set different actions for IOCs, such as Allow, No Action, or Always Block2. When you set a hash to Always Block through IOC Management, you are preventing that file from executing on any host in your organization by default2. This action also generates a detection alert when the file is blocked2.

Questions 8

What are Event Actions?

A. Automated searches that can be used to pivot between related events and searches

B. Pivotable hyperlinks available in a Host Search

C. Custom event data queries bookmarked by the currently signed in Falcon user

D. Raw Falcon event data

Buy Now

Correct Answer: A

According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, Event Actions are automated searches that can be used to pivot between related events and searches1. They are available in various tools, such as Event Search, Process Timeline, Host Timeline, etc1. You can select one or more events and perform various actions, such as show a process timeline, show a host timeline, show associated event data, show a +/- 10minute window of events, etc1. These actions can help you investigate and analyze events more efficiently and effectively1.

Questions 9

When you configure and apply an IOA exclusion, what impact does it have on the host and what you see in the console?

A. The process specified is not sent to the Falcon Sandbox for analysis

B. The associated detection will be suppressed and the associated process would have been allowed to run

C. The sensor will stop sending events from the process specified in the regex pattern

D. The associated IOA will still generate a detection but the associated process would have been allowed to run

Buy Now

Correct Answer: B

According to the CrowdStrike Falcon?Data Replicator (FDR) Add-on for Splunk Guide, IOA exclusions allow you to exclude files or directories from being detected or blocked by CrowdStrike's indicators of attack (IOAs), which are behavioral rules that identify malicious activities1. This can reduce false positives and improve performance1. When you configure and apply an IOA exclusion, the impact is that the associated detection will be suppressed and theassociated process would have been allowed to run1. This means that you will not see any alerts or events related to that IOA in the console1.

Questions 10

What does the Full Detection Details option provide?

A. It provides a visualization of program ancestry via the Process Tree View

B. It provides a visualization of program ancestry via the Process Activity View

C. It provides detailed list of detection events via the Process Table View

D. It provides a detailed list of detection events via the Process Tree View

Buy Now

Correct Answer: A

According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Full Detection Details option allows you to view detailed information about a detection, such as detection ID, severity, tactic, technique, description, etc1. You can also view the events generated by the processes involved in the detection in different ways, such as process tree, process timeline, or process activity1. The process tree view provides a visualization of program ancestry, which shows the parent-child and sibling relationships among the processes1. You can also see the event types and timestamps for each process1.

Questions 11

The Bulk Domain Search tool contains Domain information along with which of the following?

A. Process Information

B. Port Information

C. IP Lookup Information

D. Threat Actor Information

Buy Now

Correct Answer: C

According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Bulk Domain Search tool allows you to search for one or more domains and view a summary of information from Falcon events that contain those domains1. The summary includes the domain name, IP address, country, city, ISP, ASN, geolocation, hostname, sensor ID, OS, process name, command line, and organizational unit of the host that communicated with those domains1. This means that the tool contains domain information along with IP lookup information1.

Questions 12

After running an Event Search, you can select many Event Actions depending on your results. Which of the following is NOT an option for any Event Action?

A. Draw Process Explorer

B. Show a +/- 10-minute window of events

C. Show a Process Timeline for the responsible process

D. Show Associated Event Data (from TargetProcessld_decimal or ContextProcessld_decimal)

Buy Now

Correct Answer: A

According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Event Search tool allows you to search for events based on various criteria, such as event type, timestamp, hostname, IP address, etc1. You can also select one or more events and perform various actions, such as show a process timeline, show a host timeline, show associated event data, show a +/- 10-minute window of events, etc1. However, there is no option to draw a process explorer, which is a graphical representation of the process hierarchy and activity1.

Questions 13

Which of the following is an example of a MITRE ATTandCK tactic?

A. Eternal Blue

B. Defense Evasion

C. Emotet

D. Phishing

Buy Now

Correct Answer: B

According to the [MITRE ATTandCK website], MITRE ATTandCK is a knowledge base of adversary behaviors and techniques based on real-world observations. The knowledge base is organized into tactics and techniques, where tactics are the high-level goals of an adversary, such as initial access, persistence, lateral movement, etc., and techniques are the specific ways an adversary can achieve those goals, such as phishing, credential dumping, remote file copy, etc. Defense Evasion is one of the tactics defined by MITRE ATTandCK, which covers actions that adversaries take to avoid detection or prevent security controls from blocking their activities. Eternal Blue, Emotet, and Phishing are examples of techniques, not tactics.

Exam Code: CCFR-201
Exam Name: CrowdStrike Certified Falcon Responder
Last Update: Jun 10, 2025
Questions: 60

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.