Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

CCFH-202 CrowdStrike Certified Falcon Hunter Questions and Answers

Questions 4

Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?

Options:

A.

Installing a backdoor on the victim endpoint

B.

Discovering internet-facing servers

C.

Emailing the intended victim with a malware attachment

D.

Loading a malicious payload into a common DLL

Buy Now
Questions 5

The Events Data Dictionary found in the Falcon documentation is useful for writing hunting queries because:

Options:

A.

It provides pre-defined queries you can customize to meet your specific threat hunting needs

B.

It provides a list of all the detect names and descriptions found in the Falcon Cloud

C.

It provides a reference of information about the events found in the Investigate > Event Search page of the Falcon Console

D.

It provides a list of compatible splunk commands used to query event data

Buy Now
Questions 6

Which of the following best describes the purpose of the Mac Sensor report?

Options:

A.

The Mac Sensor report displays a listing of all Mac hosts without a Falcon sensor installed

B.

The Mac Sensor report provides a detection focused view of known malicious activities occurring on Mac hosts, including machine-learning and indicator-based detections

C.

The Mac Sensor report displays a listing of all Mac hosts with a Falcon sensor installed

D.

The Mac Sensor report provides a comprehensive view of activities occurring on Mac hosts, including items of interest that may be hunting or investigation leads

Buy Now
Questions 7

When performing a raw event search via the Events search page, what are Event Actions?

Options:

A.

Event Actions contains an audit information log of actions an analyst took in regards to a specific detection

B.

Event Actions contains the summary of actions taken by the Falcon sensor such as quarantining a file, prevent a process from executing or taking no actions and creating a detection only

C.

Event Actions are pivotable workflows including connecting to a host, pre-made event searches and pivots to other investigatory pages such as host search

D.

Event Actions is the field name that contains the event name defined in the Events Data Dictionary such as ProcessRollup, SyntheticProcessRollup, DNS request, etc

Buy Now
Questions 8

In which of the following stages of the Cyber Kill Chain does the actor not interact with the victim endpoint(s)?

Options:

A.

Exploitation

B.

Weaponization

C.

Command & control

D.

Installation

Buy Now
Questions 9

You want to produce a list of all event occurrences along with selected fields such as the full path, time, username etc.Which command would be the appropriate choice?

Options:

A.

fields

B.

distinctcount

C.

table

D.

values

Buy Now
Exam Code: CCFH-202
Exam Name: CrowdStrike Certified Falcon Hunter
Last Update: Jan 16, 2025
Questions: 60

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now CCFH-202 testing engine

PDF (Q&A)

$42  $104.99
buy now CCFH-202 pdf