Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CCFA-200b Questions and Answers

Question # 6

Which report would show you an overview of the top ten most-applied policies by sensors in your environment?

A.

Scheduled reports

B.

Sensor report dashboard

C.

Executive summary

D.

Sensor policy daily report

Full Access
Question # 7

To improve the organization’s security posture, you are designing a Fusion SOAR workflow to generate an alert when critical vulnerabilities are detected by Falcon. When creating a new workflow from scratch, what component of the workflow must be configured first?

A.

Action

B.

Trigger

C.

Condition

D.

Workflow Name

Full Access
Question # 8

Your incident responder team is migrating existing workflows into Fusion SOAR workflows so that they execute natively in Falcon. The workflow imports are failing. What format must the workflows be in order to successfully import them into Fusion SOAR?

A.

YAML

B.

CSV

C.

SOAR

D.

JSON

Full Access
Question # 9

When configuring a third-party integration to communicate with the Falcon API, which credential combination must be generated first?

A.

Access Key and Secret Key

B.

Integration Key and Customer ID

C.

API Client and Secret Key

D.

OAuth2 Token and Client Secret

Full Access
Question # 10

Where can you find hosts that have been offline for ten minutes or longer?

A.

Host Management

B.

Sensor Coverage Dashboard

C.

Host Groups

Full Access
Question # 11

How do you enable Falcon to quarantine files?

A.

Through Prevention policy settings

B.

Through General Settings

C.

Through manual file deletion

D.

Through system restore

Full Access
Question # 12

Which default user role will allow you to see all analyst session details?

A.

Falcon Security Lead

B.

Real Time Response - Read-Only Analyst

C.

Falcon Administrator

D.

Real Time Response - Administrator

Full Access
Question # 13

Your organization wants to monitor the use of remote access software that is currently authorized. The executable is called remote.exe. How would you trigger a detection for review of any process named remote.exe?

A.

Write an IOA rule to monitor process creation of .*\\remote\.exe

B.

Create an exclusion for remote.exe and set a workflow to email you every time the exclusion is used

C.

Write a scheduled search looking for ProcessRollup2 events for remote.exe

D.

Write an IOC for remote.exe

Full Access
Question # 14

What is an example of when you will need to refer to your Customer ID+ Checksum (CIDC)?

A.

When uninstalling a Falcon Sensor

B.

When you need to find a specific host in Host Management

C.

When defining host group assignment criteria

D.

When installing a new Falcon Sensor

Full Access
Question # 15

Which report provides a filterable high-level overview of host information such as OS version, Device Type and Machine Domain, and also provides an active sensor heat map for a quick environment review?

A.

Sensor Status Report

B.

Sensor Report

C.

Sensor Overview Report

D.

Sensor Policy Daily Report

Full Access
Question # 16

You are tasked with creating a “Workstations” host group to encompass all workstations in your environment. Which dynamic grouping criteria will most efficiently accomplish this task?

A.

OU Workstation

B.

Grouping Tags Workstation

C.

Type: Workstation

D.

Platform Windows

Full Access
Question # 17

What action should you take to securely allow operating system update processes to occur during network containment?

A.

Ensure all internal network IPs are allowed

B.

Add IPs of update sources to the Containment policy

C.

Add sources to the Host Firewall policy

D.

Remove network containment to allow access

Full Access
Question # 18

What are the components that must be allowed to manually install Falcon Sensor on macOS?

A.

Network filter extension and Full Disk Access only

B.

Full Disk Access and System extension only

C.

Network filter extension and System extension only

D.

System extension, Full Disk Access, and Network filter extension

Full Access
Question # 19

Your organization has determined that your cybersecurity architect needs to be notified via email whenever Falcon generates detections of a medium severity or higher. Additionally, the architect should be notified about any incidents with a CrowdScore of 1.0 or higher. What can the Falcon Administrator do to ensure the architect is properly alerted?

A.

Create a new Falcon user for the architect then create and assign a custom Falcon user role so they are automatically notified for the new detections and emails

B.

Create a custom Fusion SOAR workflow to send an email every time a new detection or incident is created

C.

Add the architect’s email address to the manage list for detection and incident emails from the General settings menu

D.

Create a new Falcon user for the architect and assign the Detections and Exceptions Manager role so they are automatically notified for the new detections and incidents

Full Access
Question # 20

Your development team is working on a new enterprise application, but Falcon starts creating alerts during testing. The alert points to “C:\Users\Bob\DevCode\felix.dll”. In the detection, you see that it is triggering only on a specific Falcon IOA. What would be the best course of action for this situation?

A.

Create an IOA exclusion for “C:\Users\Bob\DevCode\felix.dll”

B.

Create a Custom IOC and set it to “Allow” for “C:\Users\Bob\DevCode\felix.dll”

C.

Manually turn off the built-in IOA through prevention policies

D.

Create a sensor visibility exclusion for “C:\Users\Bob\DevCode\felix.dll”

Full Access
Question # 21

You are tasked with creating a group for hosts running Windows 10. What kind of group should you create to make sure all applicable hosts are included in your environment?

A.

Create a static group with the assignment rule criteria set to OS Type Workstation

B.

Create a dynamic group with the assignment rule criteria set to OS Type Workstation

C.

Create a static group with the assignment rule criteria for OS Version set to Windows 10

D.

Create a dynamic group with the assignment rule criteria for OS Version set to Windows 10

Full Access
Question # 22

You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?

A.

Create an Event trigger workflow that triggers on an EPP Detection with an action to assign the detection to yourself

B.

Create an Event trigger workflow that triggers on an EPP Detection with conditions looking for the desired hostname

C.

Create an alert on usage of the tools and assign the alerts to you automatically via workflow

D.

Create an IOC for the host to trigger associated detections and assign them to you via workflow

Full Access
Question # 23

When searching for a host network address, which IP notation should be used?

A.

10 10105,1010108

B.

1010102,10 10107

C.

192.168.5.1/24

D.

192 168 5 1-100

Full Access
Question # 24

What is the fastest way to locate inactive sensors in the Falcon console?

A.

Sort hosts by Last Seen timestamp

B.

Export all host data to CSV

C.

Filter the Host Management page to show inactive hosts

D.

Search for hosts with no Agent ID

Full Access
Question # 25

What is the primary concern with Windows sensors going into Reduced Functionality Mode?

A.

The sensors are unable to report any of their recorded events

B.

The sensors do not have full visibility into all events occurring on the host

C.

The hosts have been powered off or otherwise cannot communicate with the Falcon cloud

D.

The operating systems on these hosts have crashed

Full Access
Question # 26

Which setting inside the Sensor Update Policy prevents unauthorized uninstallation?

A.

Installation and Maintenance Protection

B.

Sensor Version Control Protection

C.

Uninstall and Maintenance Protection

D.

Update and Management Protection

Full Access
Question # 27

You need to look up a Red Hat Enterprise Linux (RHEL) system in Host Management. What filter would apply?

A.

Platform

B.

OS version

C.

Type

D.

OU

Full Access
Question # 28

An inactive host does not contact the Falcon cloud. What is the default number of days after which it is automatically removed from the Host Management page?

A.

30 Days

B.

90 Days

C.

45 Days

Full Access
Question # 29

You have created a new static host group to test a newly created sensor update policy, and need to add 500 servers into the group. You want to upload a list of hosts to Falcon for automatic addition into the group. What file format must the list be for this to be successfully accomplished?

A.

XLSX

B.

PDF

C.

TXT

D.

JSON

Full Access
Question # 30

A Falcon Administrator is unable to initiate a Real-Time Response (RTR) session. What is the most likely cause?

A.

The domain controller is preventing the connection

B.

The host has a user logged into it

C.

There is another analyst connected into it

D.

They do not have an RTR role assigned to them

Full Access