CCFA-200b CrowdStrike Falcon Certification Program Questions and Answers
When configuring a third-party integration to communicate with the Falcon API, which credential combination must be generated first?
What is the primary concern with Windows sensors going into Reduced Functionality Mode?
You are attempting to install the Falcon sensor on a host with a slow internet connection, and the installation fails after 20 minutes. What parameter can be used to override the 20-minute default provisioning window?
You want to add an additional layer of security to high-risk Real Time Response commands for your environment. Where do you configure MFA for RTR within the UI?
Which report would show you an overview of the top ten most-applied policies by sensors in your environment?
After enabling an IOA rule and its respective rule group, what else must be done for an IOA to be fully functional?
What happens to policy assignment when a host does not match any custom host group criteria?
Your organization has determined that your cybersecurity architect needs to be notified via email whenever Falcon generates detections of a medium severity or higher. Additionally, the architect should be notified about any incidents with a CrowdScore of 1.0 or higher. What can the Falcon Administrator do to ensure the architect is properly alerted?
Which report in Falcon can be used to determine the volume of blocked activity at a different prevention policy setting?
What least privilege role should be given to a user who needs to extract files with RTR?
Which setting inside the Sensor Update Policy prevents unauthorized uninstallation?
You have 100 hashes that have been prohibited by management and need to be blocked within your organization. Using Falcon, what is the best way to accomplish this?
A host has been Network contained with Falcon and you have been asked to update the Operating System with zero day patches. You have tried using your patch update systems for this task, but the jobs fail. Which configuration steps in the Falcon UI will allow these activities?
When troubleshooting a Windows sensor that appears to be installed but is not running, what should be verified to ensure they are installed and running?
Which ML exclusion pattern would be the most accurate for all .exe binaries in “C:\Program Files\Software\”, including any subfolders of Software?
A Falcon Administrator is unable to initiate a Real-Time Response (RTR) session. What is the most likely cause?
Your development team is working on a new enterprise application, but Falcon starts creating alerts during testing. The alert points to “C:\Users\Bob\DevCode\felix.dll”. In the detection, you see that it is triggering only on a specific Falcon IOA. What would be the best course of action for this situation?
What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?
To test a new Falcon sensor version, you have created a new sensor update policy and two separate dynamic host groups. One group contains all test Windows servers. The other group contains all of your Windows servers. The new policy was applied to only the test Windows servers host group. What is required to safely and successfully test your new sensor update policy on only your test Windows servers?
You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?
After successfully installing Falcon on a new employee’s laptop, you notice that the machine is assigned the default prevention policy instead of the custom prevention policy you created. You verify that the Falcon sensor is functioning properly, and you confirm that the custom policy is enabled and successfully running on more than 1,000 other Falcon hosts. What is the likely cause of this issue?
From the Host management page, what is the best field to filter by for Domain Controllers to obtain sensor version information?
