Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CCFR-201b CrowdStrike Certified Falcon Responder Questions and Answers

Questions 4

While reviewing the 'Detection Method' field for a high-severity alert, a responder sees the label 'Post-Exploit'. This terminology is used by CrowdStrike to identify a specific:

Options:

A.

Falcon Detection Method

B.

MITRE Tactic

C.

Indicator of Attack (IOA)

D.

Prevention Policy Level

Buy Now
Questions 5

Which of the following sentences best describes the primary use of 'Retrospective Analysis'?

Options:

A.

Identifying future threats using predictive AI models.

B.

Applying an investigative approach across historical timed buckets of telemetry to find past activity.

C.

Terminating a malicious process as it starts to execute.

D.

Recovering files that were encrypted by a ransomware attack.

Buy Now
Questions 6

A responder is analyzing a process tree where a suspicious executable is listed as a direct child of services.exe. In this scenario, which source is most likely responsible for the execution?

Options:

A.

An interactive user login via RDP.

B.

A Windows Service or a process launched by the Service Control Manager.

C.

A web browser download initiated by the end user.

D.

A script executed directly from a removable USB drive.

Buy Now
Questions 7

Executive dashboards provide a high-level view of security. Which of the following CANNOT be seen from the Executive Summary Dashboard?

Options:

A.

Detections broken down by Tactic.

B.

A breakdown of Agent Versions across the fleet.

C.

The top 10 hosts with the most detections.

D.

The organization’s current CrowdScore trend.

Buy Now
Questions 8

When a responder chooses to 'Release' a file from quarantine because it was determined to be a false positive, what type of allowlist is automatically created in the background?

Options:

A.

Filename-based allowlist

B.

Hash-based allowlist

C.

Path-based allowlist

D.

Command-line allowlist

Buy Now
Questions 9

While reviewing the high-level organizational structure of a complex detection in the Falcon console, a responder identifies several layers of activity. Which of the following is NOT officially recognized as an Objective Layer within the CrowdStrike detection hierarchy?

Options:

A.

Contact Controlled Systems

B.

Lateral Movement

C.

Gain Access

D.

Follow Through

Buy Now
Questions 10

The MITRE-Based Falcon Detections Framework is a core component of the Falcon UI. What is the primary operational advantage provided by this framework to a Tier 1 responder?

Options:

A.

It allows for the automated decryption of files affected by ransomware.

B.

It provides a standardized view of the attack lifecycle to help understand adversary behavior.

C.

It enables the sensor to block kernel-level drivers from unknown publishers.

D.

It provides a real-time count of the total number of files on the endpoint.

Buy Now
Questions 11

Which of the following is NOT a filter available on the Detections page?

Options:

A.

Severity

B.

CrowdScore

C.

Time

D.

Triggering File

Buy Now
Questions 12

What happens when a hash is allowlisted?

Options:

A.

Execution is prevented, but detection alerts are suppressed

B.

Execution is allowed on all hosts, including all other Falcon customers

C.

The hash is submitted for approval to be allowed to execute once confirmed by Falcon specialists

D.

Execution is allowed on all hosts that fall under the organization's CID

Buy Now
Questions 13

Following a detection involving a suspected ransomware binary, the Falcon sensor automatically takes a prevention action to prevent the file from executing. An analyst needs to retrieve this file for local sandbox analysis. Considering the default configuration, for how many days will this file remain stored in the encrypted quarantine folder on the local endpoint?

Options:

A.

7 days

B.

14 days

C.

30 days

D.

90 days

Buy Now
Questions 14

When examining raw event data, what is the purpose of the field called ParentProcessld_decimal?

Options:

A.

It contains an internal value not useful for an investigation

B.

It contains the TargetProcessld_decimal value of the child process

C.

It contains the Sensorld_decimal value for related events

D.

It contains the TargetProcessld_decimal of the parent process

Buy Now
Questions 15

What do IOA exclusions help you achieve?

Options:

A.

Reduce false positives based on Next-Gen Antivirus settings in the Prevention Policy

B.

Reduce false positives of behavioral detections from IOA based detections only

C.

Reduce false positives of behavioral detections from IOA based detections based on a file hash

D.

Reduce false positives of behavioral detections from Custom IOA and OverWatch detections only

Buy Now
Questions 16

Filtering is essential for managing a high volume of alerts. Which of the following filters is available by default within the 'Endpoint Detections' dashboard to help narrow down specific threats?

Options:

A.

Triggering File

B.

Hardware BIOS Version

C.

Local Subnet Mask

D.

Sensor Update Policy Name

Buy Now
Questions 17

During the triage of a detection involving a newly created persistent task, which specific indicator is most important for a responder to identify the actual intent of the service?

Options:

A.

The total CPU usage of the parent process.

B.

The command-line arguments used during the task creation.

C.

The Agent ID (AID) of the host where the detection fired.

D.

The physical location of the endpoint in the office.

Buy Now
Questions 18

A responder is unsure about the difference between 'Detection' and 'Prevention' settings. Where can they find information about Detection and Prevention Policies?

Options:

A.

On the public CrowdStrike blog.

B.

In the Support page under the Docs section.

C.

By clicking the 'About' button in the user profile.

D.

In the training videos on the main Dashboard.

Buy Now
Questions 19

The Falcon sensor can take several automated actions to protect an endpoint. Which of the following is NOT an action that Falcon takes upon detection?

Options:

A.

Process Termination

B.

File Quarantine

C.

Process Restart

D.

Network Isolation

Buy Now
Questions 20

The Falcon console integrates heavily with the MITRE ATT AND CK framework to provide industry-standard context. Which of the following tactics displayed in the detection UI is a direct implementation of a MITRE ATT AND CK tactic?

Options:

A.

Malware Action

B.

Impact

C.

Intelligence-Based Match

D.

Script-Based Execution

Buy Now
Questions 21

How long are quarantined files stored on the host?

Options:

A.

45 Days

B.

30 Days

C.

Quarantined files are never deleted from the host

D.

90 Days

Buy Now
Questions 22

Where can you find hosts that are in Reduced Functionality Mode?

Options:

A.

Event Search

B.

Executive Summary dashboard

C.

Host Search

D.

Installation Tokens

Buy Now
Questions 23

When performing a 'Hash Search', which of the following is NOT a filter available for use?

Options:

A.

SHA256

B.

MD5

C.

File Type

D.

Filename

Buy Now
Questions 24

The Bulk Domain Search tool contains Domain information along with which of the following?

Options:

A.

Process Information

B.

Port Information

C.

IP Lookup Information

D.

Threat Actor Information

Buy Now
Questions 25

A responder is analyzing a MITRE-related alert and sees the technique 'Explore > Discovery > Cloud Service Dashboard'. Which of the following scenarios best describes the technical activity associated with this technique?

Options:

A.

An adversary uses an automated script to bruteforce S3 bucket permissions.

B.

An adversary uses a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment.

C.

An adversary executes an API call to terminate all running EC2 instances in a region.

D.

An adversary deploys a crypto-miner inside a compromised Docker container.

Buy Now
Questions 26

Which is TRUE regarding a file released from quarantine?

Options:

A.

No executions are allowed for 14 days after release

B.

It is allowed to execute on all hosts

C.

It is deleted

D.

It will not generate future machine learning detections on the associated host

Buy Now
Questions 27

While the host timeline is comprehensive, some data is not included in that specific view. Which of the following CANNOT be seen directly from the host timeline?

Options:

A.

Timestamp

B.

Event Name

C.

PID (Process ID)

D.

CPU Temperature

Buy Now
Questions 28

When using 'User Search' to investigate a potentially compromised account, which of the following is NOT a filter available in the User Search?

Options:

A.

Username

B.

Hostname

C.

Process ID

D.

Time Range

Buy Now
Questions 29

Host Search is a powerful investigation tool. From which of the following sources is a responder most likely to pivot directly to a Host Search?

Options:

A.

A global intelligence report about a new adversary.

B.

A specific detection that occurred on a particular host.

C.

The main settings menu of the Falcon console.

D.

The help documentation in the Support portal.

Buy Now
Questions 30

In the Hash Search tool, which of the following is listed under Process Executions?

Options:

A.

Operating System

B.

File Signature

C.

Command Line

D.

Sensor Version

Buy Now
Questions 31

A responder needs to view a high-level overview of the environment's security posture. Where can they find the 'Activity Dashboard'?

Options:

A.

Investigate > Activity Dashboard

B.

Endpoint Security > Monitor > Activity Dashboard

C.

Configuration > General > Activity Dashboard

D.

Support > Analytics > Activity Dashboard

Buy Now
Questions 32

To perform a deep-dive investigation into a specific detection, a responder needs to pivot to a process timeline. What is the minimum information required to be gathered from the detection before making this pivot?

Options:

A.

The External IP and the Username of the logged-in user.

B.

The Agent ID (AID) and the Target Process ID (TargetProcessId_decimal).

C.

The MAC Address of the host and the SHA256 hash of the file.

D.

The Policy ID and the timestamp of the first event.

Buy Now
Questions 33

An analyst is triaging a detection that has been categorized under the ‘Follow Through’ Objective Layer. Based on the Falcon technical documentation, which of the following adversary tactics is most likely to be observed within this specific layer?

Options:

A.

Credential Access through memory scraping

B.

Collection of sensitive data for exfiltration

C.

Initial Access via a drive-by download

D.

Discovery of local network shares and services

Buy Now
Questions 34

Which tool or search type is recommended as the "best search" to use when performing the "Examine what's normal for this system" step in an investigation?

Options:

A.

User Search

B.

Host Search

C.

Hash Search

D.

IP Search

Buy Now
Questions 35

The Falcon console is divided into several modules. Timelines (Host and Process) are technically a part of which Falcon page?

Options:

A.

Activity

B.

Investigate

C.

Configuration

D.

Dashboards

Buy Now
Questions 36

Falcon uses specific identifiers to track processes across the environment. Which of the following sentences best describes what the 'TargetProcessId_decimal' raw data represents?

Options:

A.

The standard Process ID (PID) assigned by the Windows operating system.

B.

A sensor-assigned decimal number that is unique for each process across time and hosts.

C.

The memory address where the process’s executable is loaded.

D.

The total number of seconds the process has been running.

Buy Now
Questions 37

Where are quarantined files stored on Windows hosts?

Options:

A.

Windows\Quarantine

B.

Windows\System32\Drivers\CrowdStrike\Quarantine

C.

Windows\System32\

D.

Windows\temp\Drivers\CrowdStrike\Quarantine

Buy Now
Questions 38

An analyst needs to perform local sandbox analysis on a malicious file. When they download a quarantined file from the Falcon UI, what is the file format and the default password?

Options:

A.

.zip, password: crowdstrike

B.

.7-zip, password: infected

C.

.rar, password: malware

D.

.exe, no password

Buy Now
Questions 39

From a detection, what is the fastest way to see children and sibling process information?

Options:

A.

Select the Event Search option. Then from the Event Actions, select Show Associated Event Data (From TargetProcessld_decimal)

B.

Select Full Detection Details from the detection

C.

Right-click the process and select "Follow Process Chain"

D.

Select the Process Timeline feature, enter the AID. Target Process ID, and Parent Process ID

Buy Now
Questions 40

What happens when you open the full detection details?

Options:

A.

Theprocess explorer opens and the detection is removed from the console

B.

The process explorer opens and you're able to view the processes and process relationships

C.

The process explorer opens and the detection copies to the clipboard

D.

The process explorer opens and the Event Search query is run for the detection

Buy Now
Questions 41

After pivoting to an event search from a detection, you locate the ProcessRollup2 event. Which two field values are you required to obtain to perform a Process Timeline search so you can determine what the process was doing?

Options:

A.

SHA256 and TargetProcessld_decimal

B.

SHA256 and ParentProcessld_decimal

C.

aid and ParentProcessld_decimal

D.

aid and TargetProcessld_decimal

Buy Now
Questions 42

Which of the following statements about the 'Detection Activity' report is FALSE?

Options:

A.

It provides a summary of all alerts over a selected time period.

B.

It can be filtered by host name or severity.

C.

Clicking on a ProcessID value within the report pivots to a pre-populated Event Search.

D.

The report can be exported to a CSV file.

Buy Now
Questions 43

Which of the following sentences best describes the primary objective of 'Real-time Analysis' within the Falcon platform?

Options:

A.

Analyzing historical logs from the past 90 days to find missed threats.

B.

Investigating incoming telemetry in real time or on a near real-time basis to catch active threats.

C.

Scanning every file on a hard drive once per week for dormant viruses.

D.

Manually updating the Falcon sensor on every machine in the fleet.

Buy Now
Questions 44

An analyst notices a detection that has been automatically flagged with the 'New Activity' status. Which of the following statements best describes what this status indicates?

Options:

A.

A brand new detection has been triggered on a host that was recently added to the network.

B.

A detection that was previously moved to a resolved status has generated new telemetry and activity.

C.

A user has logged into a machine for the first time since the sensor was installed.

D.

The Falcon Overwatch team has manually verified that the detection is an active threat.

Buy Now
Questions 45

Which option indicates a hash is allowlisted?

Options:

A.

No Action

B.

Allow

C.

Ignore

D.

Always Block

Buy Now
Questions 46

You receive an email from a third-party vendor that one of their services is compromised,thevendor names a specific IP address that the compromised service was using. Where would you input this indicator to find any activity related to this IP address?

Options:

A.

IP Addresses

B.

Remote or Network Logon Activity

C.

Remote Access Graph

D.

Hash Executions

Buy Now
Questions 47

When an analyst is trying to pinpoint the exact moment an endpoint came online after being shut down for the weekend, which timeline view is the best to use?

Options:

A.

Process Timeline

B.

Host Timeline

C.

User Timeline

D.

Network Timeline

Buy Now
Questions 48

When analyzing the raw telemetry for a 'DNSRequest' event, which of the following raw data fields is available to the responder?

Options:

A.

browser_type

B.

index

C.

cpu_usage_percent

D.

monitor_mode

Buy Now
Questions 49

When reviewing a Host Timeline, which of the following filters is available?

Options:

A.

Severity

B.

Event Types

C.

User Name

D.

Detection ID

Buy Now
Questions 50

You notice that taskeng.exe is one of the processes involved in a detection. What activity should you investigate next?

Options:

A.

User logons after the detection

B.

Executions of schtasks.exe after the detection

C.

Scheduled tasks registered prior to the detection

D.

Pivot to a Hash search for taskeng.exe

Buy Now
Questions 51

What is an advantage of using a Process Timeline?

Options:

A.

Process related events can be filtered to display specific event types

B.

Suspicious processes are color-coded based on their frequency and legitimacy over time

C.

Processes responsible for spikes in CPU performance are displayed overtime

D.

A visual representation of Parent-Child and Sibling process relationships is provided

Buy Now
Questions 52

When an organization needs to detect a specific behavior that is unique to their environment, they can create a Custom IOA. Which of the following is NOT required when configuring a custom IOA from scratch?

Options:

A.

Selecting a Rule Type (e.g., Process Creation).

B.

Specifying the Severity level of the resulting detection.

C.

Assigning a specific host group to the IOA rule at the time of creation.

D.

Providing a unique name for the rule.

Buy Now
Questions 53

When analyzing an executable with a global prevalence of common; but you do not know what the executable is. what is the best course of action?

Options:

A.

Do nothing, as this file is common and well known

B.

From detection, click the VT Hash button to pivot to VirusTotal to investigate further

C.

From detection, use API manager to create a custom blocklist

D.

From detection, submit to FalconX for deep dive analysis

Buy Now
Questions 54

The Falcon platform will show a maximum of how many detections per day for a single Agent Identifier (AID)?

Options:

A.

500

B.

750

C.

1000

D.

1200

Buy Now
Exam Code: CCFR-201b
Exam Name: CrowdStrike Certified Falcon Responder
Last Update: Apr 30, 2026
Questions: 181

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CCFR-201b testing engine

PDF (Q&A)

$43.57  $124.49
buy now CCFR-201b pdf