Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CCFA-200 CrowdStrike Certified Falcon Administrator Questions and Answers

Questions 4

A sensor that has not contacted the Falcon cloud will be automatically deleted from the hosts list after how many days?

Options:

A.

45 Days

B.

60 Days

C.

30 Days

D.

90 Days

Buy Now
Questions 5

What are custom alerts based on?

Options:

A.

Custom workflows

B.

Custom event based triggers

C.

Predefined alert templates

D.

User defined Splunk queries

Buy Now
Questions 6

Which of the following scenarios best describes when you would add IP addresses to the containment policy?

Options:

A.

You want to automate the Network Containment process based on the IP address of a host

B.

Your organization has additional IP addresses that need to be able to access the Falcon console

C.

A new group of analysts need to be able to place hosts under Network Containment

D.

Your organization has resources that need to be accessible when hosts are network contained

Buy Now
Questions 7

You have an existing workflow that is triggered on a critical detection that sends an email to the escalation team. Your CISO has asked to also be notified via email with a customized message. What is the best way to update the workflow?

Options:

A.

Clone the workflow and replace the existing email with your CISO's email

B.

Add a sequential action to send a custom email to your CISO

C.

Add a parallel action to send a custom email to your CISO

D.

Add the CISO's email to the existing action

Buy Now
Questions 8

Where can you find your company's Customer ID (CID)?

Options:

A.

The CID is a secret key used for Falcon communication and is never shared with the customer

B.

The CID is only available by calling support

C.

The CID is located at Hosts setup and management > Deploy > Sensor Downloads and is listed along with the

checksum

D.

The CID is located at Hosts > Host Management

Buy Now
Questions 9

Which of the following is NOT an available action for an API Client?

Options:

A.

Edit an API Client

B.

Reset an API Client Secret

C.

Retrieve an API Client Secret

D.

Delete an API Client

Buy Now
Questions 10

Which role will allow someone to manage quarantine files?

Options:

A.

Falcon Security Lead

B.

Detections Exceptions Manager

C.

Falcon Analyst – Read Only

D.

Endpoint Manager

Buy Now
Questions 11

What is the purpose of precedence with respect to the Sensor Update policy?

Options:

A.

Precedence applies to the Prevention policy and not to the Sensor Update policy

B.

Hosts assigned to multiple policies will assume the highest ranked policy in the list (policy with the lowest number)

C.

Hosts assigned to multiple policies will assume the lowest ranked policy in the list (policy with the highest number)

D.

Precedence ensures that conflicting policy settings are not set in the same policy

Buy Now
Questions 12

How are user permissions set in Falcon?

Options:

A.

Permissions are assigned to a User Group and then users are assigned to that group, thereby inheriting those permissions

B.

Pre-defined permissions are assigned to sets called roles. Users can be assigned multiple roles based on job function and they assume a cumulative set of permissions based on those assignments

C.

An administrator selects individual granular permissions from the Falcon Permissions List during user creation

D.

Permissions are token-based. Users request access to a defined set of permissions and an administrator adds their token to the set of permissions

Buy Now
Questions 13

What is the purpose of the Machine-Learning Prevention Monitoring Report?

Options:

A.

It is designed to give an administrator a quick overview of machine-learning aggressiveness settings as well as the numbers of items actually quarantined

B.

It is the dashboard used by an analyst to view all items quarantined and to release any items deemed non-malicious

C.

It is the dashboard used to see machine-learning preventions, and it is used to identify spikes in activity and possible targeted attacks

D.

It is designed to show malware that would have been blocked in your environment based on different Machine-Learning Prevention settings

Buy Now
Questions 14

What best describes what happens to detections in the console after clicking "Disable Detections" for a host from within the Host Management page?

Options:

A.

The detections for the host are removed from the console immediately and no new detections will display in the console going forward

B.

You cannot disable detections for a host

C.

Existing detections for the host remain, but no new detections will display in the console going forward

D.

Preventions will be disabled for the host

Buy Now
Questions 15

What must an admin do to reset a user's password?

Options:

A.

From User Management, open the account details for the affected user and select "Generate New Password"

B.

From User Management, select "Reset Password" from the three dot menu for the affected user account

C.

From User Management, select "Update Account" and manually create a new password for the affected user account

D.

From User Management, the administrator must rebuild the account as the certificate for user specific private/public key generation is no longer valid

Buy Now
Questions 16

Which of the following options is a feature found ONLY with the Sensor-based Machine Learning (ML)?

Options:

A.

Next-Gen Antivirus (NGAV) protection

B.

Adware and Potentially Unwanted Program detection and prevention

C.

Real-time offline protection

D.

Identification and analysis of unknown executables

Buy Now
Questions 17

Where can you modify settings to permit certain traffic during a containment period?

Options:

A.

Prevention Policy

B.

Host Settings

C.

Containment Policy

D.

Firewall Settings

Buy Now
Questions 18

What best describes the relationship between Sensor Update policies and Operating Systems?

Options:

A.

Windows and Mac share Sensor Update policies. Linux requires its own set of polices based on the different kernel versions

B.

Sensor Update polices are not Operating System specific. One policy can be applied to all Operating Systems

C.

Windows has its own Sensor Update polices. But Mac and Linux share Sensor Update policies

D.

A Sensor Update policy must be configured for each Operating System (Windows, Mac, Linux)

Buy Now
Questions 19

When performing targeted filtering for a host on the Host Management Page, which filter bar attribute is NOT case-sensitive?

Options:

A.

Username

B.

Model

C.

Domain

D.

Hostname

Buy Now
Questions 20

Where should you look to find the history of the successes and failures for any Falcon Fusion workflows?

Options:

A.

Workflow Execution log

B.

Falcon Ul Audit Trail

C.

Workflow Audit log

D.

Custom Alert History

Buy Now
Questions 21

Which of the following is TRUE of the Logon Activities Report?

Options:

A.

Shows a graphical view of user logon activity and the hosts the user connected to

B.

The report can be filtered by computer name

C.

It gives a detailed list of all logon activity for users

D.

It only gives a summary of the last logon activity for users

Buy Now
Questions 22

What three things does a workflow condition consist of?

Options:

A.

A parameter, an operator, and a value

B.

A beginning, a middle, and an end

C.

Triggers, actions, and alerts

D.

Notifications, alerts, and API's

Buy Now
Questions 23

Which role allows a user to connect to hosts using Real-Time Response?

Options:

A.

Endpoint Manager

B.

Falcon Administrator

C.

Real Time Responder – Active Responder

D.

Prevention Hashes Manager

Buy Now
Questions 24

When creating an API client, which of the following must be saved immediately since it cannot be viewed again after the client is created?

Options:

A.

Base URL

B.

Secret

C.

Client ID

D.

Client name

Buy Now
Questions 25

What best describes what happens to detections in the console after clicking "Enable Detections" for a host which previously had its detections disabled?

Options:

A.

Enables custom detections for the host

B.

New detections will start appearing in the console, and all retroactive stored detections will be restored to the console for that host

C.

New detections will start appearing in the console immediately. Previous detections will not be restored to the console for that host

D.

Preventions will be enabled for the host

Buy Now
Questions 26

The Customer ID (CID) is important in which of the following scenarios?

Options:

A.

When adding a user to the Falcon console under the Users application

B.

When performing the sensor installation process

C.

When setting up API keys

D.

When performing a Host Search

Buy Now
Questions 27

When uninstalling a sensor, which of the following is required if the 'Uninstall and maintenance protection' setting is enabled within the Sensor Update Policies?

Options:

A.

Maintenance token

B.

Customer ID (CID)

C.

Bulk update key

D.

Agent ID (AID)

Buy Now
Questions 28

You have created a Sensor Update Policy for the Mac platform. Which other operating system(s) will this policy manage?

Options:

A.

*nix

B.

Windows

C.

Both Windows and *nix

D.

Only Mac

Buy Now
Questions 29

Custom IOA rules are defined using which syntax?

Options:

A.

Glob

B.

PowerShell

C.

Yara

D.

Regex

Buy Now
Questions 30

Which of the following is TRUE regarding Falcon Next-Gen AntiVirus (NGAV)?

Options:

A.

Falcon NGAV relies on signature-based detections

B.

Activating Falcon NGAV will also enable all detection and prevention settings in the entire policy

C.

The Detection sliders cannot be set to a value less aggressive than the Prevention sliders

D.

Falcon NGAV is not a replacement for Windows Defender or other antivirus programs

Buy Now
Questions 31

How can a API client secret be viewed after it has been created?

Options:

A.

Within the API management page, API client secrets can be accessed within the "edit client" functionality

B.

The API client secret must be reset or a new client created as the secret cannot be viewed after it has been created

C.

The API client secret can be provided by support via direct email request from a Falcon Administrator

D.

Selecting "show secret" within the 3-dot dropdown menu will reveal the secret for the selected api client

Buy Now
Questions 32

You have been asked to troubleshoot why Script Based Execution Monitoring (SBEM) is not enabled on a Falcon host. Which report can be used to determine if this is an issue with an old prevention policy?

Options:

A.

Host Update Status Report

B.

Custom Alerting Audit Trail

C.

Prevention Policy Debug

D.

SBEM Debug Report

Buy Now
Questions 33

Which of the following is a valid step when troubleshooting sensor installation failure?

Options:

A.

Confirm all required services are running on the system

B.

Enable the Windows firewall

C.

Disable SSL and TLS on the host

D.

Delete any available application crash log files

Buy Now
Questions 34

Which option best describes the general process Whereinstallation of the Falcon Sensor on MacOS?

Options:

A.

Grant the Falcon Package Full Disk Access, install the Falcon package, use falconctl to license the sensor

B.

Install the Falcon package passing it the installation token in the command line

C.

Install the Falcon package, use falconctl to license the sensor, approve the system extension, grant the sensor Full Disk Access

D.

Grant the Falcon Package Full Disk Access, install the Falcon package, load the Falcon Sensor with the command 'falconctl stats'

Buy Now
Questions 35

Which of the following Machine Learning (ML) sliders will only detect or prevent high confidence malicious items?

Options:

A.

Aggressive

B.

Cautious

C.

Minimal

D.

Moderate

Buy Now
Questions 36

What is the purpose of using groups with Sensor Update policies in CrowdStrike Falcon?

Options:

A.

To group hosts with others in the same business unit

B.

To group hosts according to the order in which Falcon was installed, so that updates are installed in the same order every time

C.

To prioritize the order in which Falcon updates are installed, so that updates are not installed all at once leading to network congestion

D.

To allow the controlled assignment of sensor versions onto specific hosts

Buy Now
Questions 37

Why do Sensor Update policies need to be configured for each OS (Windows, Mac, Linux)?

Options:

A.

To bundle the Sensor and Prevention policies together into a deployment package

B.

Sensor Update policies are OS dependent

C.

To assist with auditing and change management

D.

This is false. One policy can be applied to all Operating Systems

Buy Now
Questions 38

On a Windows host, what is the best command to determine if the sensor is currently running?

Options:

A.

sc query csagent

B.

netstat -a

C.

This cannot be accomplished with a command

D.

ping falcon.crowdstrike.com

Buy Now
Questions 39

Where in the console can you find a list of all hosts in your environment that are in Reduced Functionality Mode (RFM)?

Options:

A.

Host Dashboard

B.

Host Management > Filter for RFM

C.

Inactive Sensor Report

D.

Containment Policy

Buy Now
Questions 40

Which role is required to manage groups and policies in Falcon?

Options:

A.

Falcon Host Analyst

B.

Falcon Host Administrator

C.

Prevention Hashes Manager

D.

Falcon Host Security Lead

Buy Now
Questions 41

What is the most common cause of a Windows Sensor entering Reduced Functionality Mode (RFM)?

Options:

A.

Falcon console updates are pending

B.

Falcon sensors installing an update

C.

Notifications have been disabled on that host sensor

D.

Microsoft updates

Buy Now
Questions 42

Even though you are a Falcon Administrator, you discover you are unable to use the "Connect to Host" feature to gather additional information which is only available on the host. Which role do you need added to your user account to have this capability?

Options:

A.

Real Time Responder

B.

Endpoint Manager

C.

Falcon Investigator

D.

Remediation Manager

Buy Now
Questions 43

Which of the following applies to Custom Blocking Prevention Policy settings?

Options:

A.

Hashes must be entered on the Prevention Hashes page before they can be blocked via this policy

B.

Blocklisting applies to hashes, IP addresses, and domains

C.

Executions blocked via hash blocklist may have partially executed prior to hash calculation process remediation may be necessary

D.

You can only blocklist hashes via the API

Buy Now
Questions 44

What is the function of a single asterisk (*) in an ML exclusion pattern?

Options:

A.

The single asterisk will match any number of characters, including none. It does include separator characters, such as \ or /, which separate portions of a file path

B.

The single asterisk will match any number of characters, including none. It does not include separator characters, such as \ or /, which separate portions of a file path

C.

The single asterisk is the insertion point for the variable list that follows the path

D.

The single asterisk is only used to start an expression, and it represents the drive letter

Buy Now
Questions 45

In order to quarantine files on the host, what prevention policy settings must be enabled?

Options:

A.

Malware Protection and Custom Execution Blocking must be enabled

B.

Next-Gen Antivirus Prevention sliders and "Quarantine & Security Center Registration" must be enabled

C.

Malware Protection and Windows Anti-Malware Execution Blocking must be enabled

D.

Behavior-Based Threat Prevention sliders and Advanced Remediation Actions must be enabled

Buy Now
Exam Code: CCFA-200
Exam Name: CrowdStrike Certified Falcon Administrator
Last Update: Jan 18, 2025
Questions: 153
CCFA-200 pdf

CCFA-200 PDF

$29.75  $84.99
CCFA-200 Engine

CCFA-200 Testing Engine

$35  $99.99
CCFA-200 PDF + Engine

CCFA-200 PDF + Testing Engine

$47.25  $134.99