Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CCFA-200b CrowdStrike Falcon Certification Program Questions and Answers

Questions 4

When configuring a third-party integration to communicate with the Falcon API, which credential combination must be generated first?

Options:

A.

Access Key and Secret Key

B.

Integration Key and Customer ID

C.

API Client and Secret Key

D.

OAuth2 Token and Client Secret

Buy Now
Questions 5

What is the primary concern with Windows sensors going into Reduced Functionality Mode?

Options:

A.

The sensors are unable to report any of their recorded events

B.

The sensors do not have full visibility into all events occurring on the host

C.

The hosts have been powered off or otherwise cannot communicate with the Falcon cloud

D.

The operating systems on these hosts have crashed

Buy Now
Questions 6

You are attempting to install the Falcon sensor on a host with a slow internet connection, and the installation fails after 20 minutes. What parameter can be used to override the 20-minute default provisioning window?

Options:

A.

Timeout=30

B.

ProvNoWait=1

C.

Timeout=0

D.

DelayedStart=1

Buy Now
Questions 7

You want to add an additional layer of security to high-risk Real Time Response commands for your environment. Where do you configure MFA for RTR within the UI?

Options:

A.

General settings

B.

Notifications

C.

Response policies

D.

Containment policy

Buy Now
Questions 8

Which report would show you an overview of the top ten most-applied policies by sensors in your environment?

Options:

A.

Scheduled reports

B.

Sensor report dashboard

C.

Executive summary

D.

Sensor policy daily report

Buy Now
Questions 9

After enabling an IOA rule and its respective rule group, what else must be done for an IOA to be fully functional?

Options:

A.

The rule must be manually triggered

B.

Hosts must be individually selected to apply to the rule

C.

The rule group must be assigned to a prevention policy

Buy Now
Questions 10

What happens to policy assignment when a host does not match any custom host group criteria?

Options:

A.

The last active policy remains

B.

The default policy is applied

C.

No policy is applied

D.

The most restrictive policy is applied

Buy Now
Questions 11

Your organization has determined that your cybersecurity architect needs to be notified via email whenever Falcon generates detections of a medium severity or higher. Additionally, the architect should be notified about any incidents with a CrowdScore of 1.0 or higher. What can the Falcon Administrator do to ensure the architect is properly alerted?

Options:

A.

Create a new Falcon user for the architect then create and assign a custom Falcon user role so they are automatically notified for the new detections and emails

B.

Create a custom Fusion SOAR workflow to send an email every time a new detection or incident is created

C.

Add the architect’s email address to the manage list for detection and incident emails from the General settings menu

D.

Create a new Falcon user for the architect and assign the Detections and Exceptions Manager role so they are automatically notified for the new detections and incidents

Buy Now
Questions 12

What default user role can manage API credentials?

Options:

A.

Falcon Security Lead

B.

Falcon Administrator

C.

Falcon API Manager

D.

Endpoint Manager

Buy Now
Questions 13

Which role allows a Falcon user to create Real Time Response Custom Scripts?

Options:

A.

Real Time Responder – Active Responder

B.

Real Time Responder – Administrator

C.

Real Time Responder – Read Only Analyst

D.

Real Time Responder – Script Developer

Buy Now
Questions 14

Which report in Falcon can be used to determine the volume of blocked activity at a different prevention policy setting?

Options:

A.

Falcon Prevention Policy Debug

B.

Machine Learning Prevention Monitoring

C.

Prevention Policy Audit Trail

Buy Now
Questions 15

What least privilege role should be given to a user who needs to extract files with RTR?

Options:

A.

Real Time Responder - Active Responder

B.

Falcon Security Lead

C.

Falcon Investigator

D.

Real Time Responder - Administrator

Buy Now
Questions 16

Which setting inside the Sensor Update Policy prevents unauthorized uninstallation?

Options:

A.

Installation and Maintenance Protection

B.

Sensor Version Control Protection

C.

Uninstall and Maintenance Protection

D.

Update and Management Protection

Buy Now
Questions 17

You have 100 hashes that have been prohibited by management and need to be blocked within your organization. Using Falcon, what is the best way to accomplish this?

Options:

A.

Navigate to Configure > IOC Management. Add a custom IOC. Add the list of hashes. Set the action to Block. Verify the prevention policy includes Custom Blocking under Execution Blocking.

B.

Navigate to Configure > Prevention policies. Add an IOC Policy. Add the list of hashes as CSV file. Set the action to Block. Verify Custom Execution Blocking is active.

C.

Navigate to Configure > IOC Management. Add a custom Prevention Policy. Add the list of hashes. Set the action to Block. Verify the policy includes Custom Execution Blocking.

D.

Navigate to Configure > Prevention policies. Add an IOC Policy. Add the list of hashes as CSV file. Set the action to Block and Alert. Verify Custom Blocking inside Execution Blocking is active.

Buy Now
Questions 18

A host has been Network contained with Falcon and you have been asked to update the Operating System with zero day patches. You have tried using your patch update systems for this task, but the jobs fail. Which configuration steps in the Falcon UI will allow these activities?

Options:

A.

Create a Containment Policy that allow lists the specific IP addresses of your patch management tools

B.

Create a Containment Policy that allow lists the Fully Qualified name of your patch management tools

C.

Remove Host containment and update the host with all patches

D.

Create a Firewall Policy that allow lists your patch management tools

Buy Now
Questions 19

What is the primary purpose of custom IOA rules?

Options:

A.

Block known malware

B.

Identify malicious behavior

C.

Manage system updates

D.

Configure network settings

Buy Now
Questions 20

When troubleshooting a Windows sensor that appears to be installed but is not running, what should be verified to ensure they are installed and running?

Options:

A.

LMHosts and Windows Base Filtering Engine

B.

Windows firewall and internet connectivity to the CrowdStrike cloud

C.

Network Store Interface and Network List Service

Buy Now
Questions 21

Which ML exclusion pattern would be the most accurate for all .exe binaries in “C:\Program Files\Software\”, including any subfolders of Software?

Options:

A.

Program Files\Software* .exe

B.

Program Files\Software*.exe

C.

Program Files\Software* *.exe

D.

***.exe

Buy Now
Questions 22

A Falcon Administrator is unable to initiate a Real-Time Response (RTR) session. What is the most likely cause?

Options:

A.

The domain controller is preventing the connection

B.

The host has a user logged into it

C.

There is another analyst connected into it

D.

They do not have an RTR role assigned to them

Buy Now
Questions 23

Your development team is working on a new enterprise application, but Falcon starts creating alerts during testing. The alert points to “C:\Users\Bob\DevCode\felix.dll”. In the detection, you see that it is triggering only on a specific Falcon IOA. What would be the best course of action for this situation?

Options:

A.

Create an IOA exclusion for “C:\Users\Bob\DevCode\felix.dll”

B.

Create a Custom IOC and set it to “Allow” for “C:\Users\Bob\DevCode\felix.dll”

C.

Manually turn off the built-in IOA through prevention policies

D.

Create a sensor visibility exclusion for “C:\Users\Bob\DevCode\felix.dll”

Buy Now
Questions 24

What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?

Options:

A.

Host Modification Protection

B.

System Configuration Protection

C.

Sensor Tampering Protection

D.

Sensor Modification Protection

Buy Now
Questions 25

What is true about the Default Sensor Policy?

Options:

A.

It tests the sensor configuration settings before deployment

B.

It is applied automatically if no other Sensor Policies are applied

C.

It can be used to reset all sensor settings to Default

D.

It is a mechanism to deploy the oldest supported version of the Falcon Sensor

Buy Now
Questions 26

To test a new Falcon sensor version, you have created a new sensor update policy and two separate dynamic host groups. One group contains all test Windows servers. The other group contains all of your Windows servers. The new policy was applied to only the test Windows servers host group. What is required to safely and successfully test your new sensor update policy on only your test Windows servers?

Options:

A.

The new policy must be enabled and assigned a precedence that is lower when compared to the policy assigned to all Windows servers

B.

The new policy must be enabled and assigned a precedence that is higher when compared to the policy assigned to all Windows servers

C.

The new Falcon sensor version should be manually installed by you on every test Windows server before ever enabling and assigning the new policy

D.

The new Falcon sensor version should be manually uninstalled by you on every test Windows server before ever enabling and assigning the new policy

Buy Now
Questions 27

You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?

Options:

A.

Create an Event trigger workflow that triggers on an EPP Detection with an action to assign the detection to yourself

B.

Create an Event trigger workflow that triggers on an EPP Detection with conditions looking for the desired hostname

C.

Create an alert on usage of the tools and assign the alerts to you automatically via workflow

D.

Create an IOC for the host to trigger associated detections and assign them to you via workflow

Buy Now
Questions 28

After successfully installing Falcon on a new employee’s laptop, you notice that the machine is assigned the default prevention policy instead of the custom prevention policy you created. You verify that the Falcon sensor is functioning properly, and you confirm that the custom policy is enabled and successfully running on more than 1,000 other Falcon hosts. What is the likely cause of this issue?

Options:

A.

Falcon requires a 24-hour waiting period to apply custom policies to newly installed hosts

B.

A host-based firewall rule is preventing the custom policy from applying successfully

C.

The laptop is not a member of a host group assigned to the custom policy

D.

A prompt to apply the new prevention policy was manually declined

Buy Now
Questions 29

From the Host management page, what is the best field to filter by for Domain Controllers to obtain sensor version information?

Options:

A.

Sensor Version

B.

Type

C.

Platform

D.

OS Version

Buy Now
Questions 30

What are the two automated triggers that cause a Fusion SOAR workflow to run?

Options:

A.

Incident and detections triggers

B.

Event and scheduled triggers

C.

Condition and action triggers

D.

Event and action triggers

Buy Now
Exam Code: CCFA-200b
Exam Name: CrowdStrike Falcon Certification Program
Last Update: May 16, 2026
Questions: 100

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CCFA-200b testing engine

PDF (Q&A)

$43.57  $124.49
buy now CCFA-200b pdf