New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! CCFH-202 has been withdrawn. The new exam code is CCFH-202b

Practice Free CCFH-202 CrowdStrike Certified Falcon Hunter Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CrowdStrike CCFH-202 Exam the most current and reliable questions . To help people study, we've made some of our CrowdStrike Certified Falcon Hunter exam materials available for free to everyone. You can take the Free CCFH-202 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

When exporting the results of the following event search, what data is saved in the exported file (assuming Verbose Mode)? event_simpleName=*Written | stats count by ComputerName

A.

The text of the query

B.

The results of the Statistics tab

C.

No data Results can only be exported when the "table" command is used

D.

All events in the Events tab

Question # 7

The Events Data Dictionary found in the Falcon documentation is useful for writing hunting queries because:

A.

It provides pre-defined queries you can customize to meet your specific threat hunting needs

B.

It provides a list of all the detect names and descriptions found in the Falcon Cloud

C.

It provides a reference of information about the events found in the Investigate > Event Search page of the Falcon Console

D.

It provides a list of compatible splunk commands used to query event data

Question # 8

Adversaries commonly execute discovery commands such as netexe, ipconfig.exe, and whoami exe. Rather than query for each of these commands individually, you would like to use a single query with all of them. What Splunk operator is needed to complete the following query?

CCFH-202 question answer

A.

OR

B.

IN

C.

NOT

D.

AND

Question # 9

You would like to search for ANY process execution that used a file stored in the Recycle Bin on a Windows host. Select the option to complete the following EAM query.

CCFH-202 question answer

A.

*$Recycle Bin^

B.

*$Recycle Bin*

C.

^$Recycle Bin*

D.

^$Recycle.Bin%^

Question # 10

An analyst has sorted all recent detections in the Falcon platform to identify the oldest in an effort to determine the possible first victim host What is this type of analysis called?

A.

Visualization of hosts

B.

Statistical analysis

C.

Temporal analysis

D.

Machine Learning

Question # 11

What do you click to jump to a Process Timeline from many pages in Falcon, such as a Hash Search?

A.

PID

B.

Process ID or Parent Process ID

C.

CID

D.

Process Timeline Link

Question # 12

Which of the following would be the correct field name to find the name of an event?

A.

Event_SimpleName

B.

Event_Simple_Name

C.

EVENT_SIMPLE_NAME

D.

event_simpleName

Question # 13

What Search page would help a threat hunter differentiate testing, DevOPs, or general user activity from adversary behavior?

A.

Hash Search

B.

IP Search

C.

Domain Search

D.

User Search

Question # 14

With Custom Alerts you are able to configure email alerts using predefined templates so you're notified about specific activity in your environment. Which of the following outlines the steps required to properly create a custom alert rule?

A.

Choose the template you would like to configure, setup how often you would like the alert to run, and then schedule the alert

B.

Choose the template you would like to configure, preview the search results, and then schedule the alert

C.

Create the query for the alert, setup the email template for the alert, and then set the schedule for the alert

D.

Create a new custom template, configure the email template, and then create the custom query for the alert

Question # 15

The Falcon Detections page will attempt to decode Encoded PowerShell Command line parameters when which PowerShell Command line parameter is present?

A.

-Command

B.

-Hidden

C.

-e

D.

-nop

Question # 16

Which SPL (Splunk) field name can be used to automatically convert Unix times (Epoch) to UTC readable time within the Flacon Event Search?

A.

utc_time

B.

conv_time

C.

_time

D.

time

Question # 17

Which of the following is a suspicious process behavior?

A.

PowerShell running an execution policy of RemoteSigned

B.

An Internet browser (eg, Internet Explorer) performing multiple DNS requests

C.

PowerShell launching a PowerShell script

D.

Non-network processes (eg, notepad exe) making an outbound network connection

Question # 18

Which of the following is an example of a Falcon threat hunting lead?

A.

A routine threat hunt query showing process executions of single letter filename (e.g., a.exe) from temporary directories

B.

Security appliance logs showing potentially bad traffic to an unknown external IP address

C.

A help desk ticket for a user clicking on a link in an email causing their machine to become unresponsive and have high CPU usage

D.

An external report describing a unique 5 character file extension for ransomware encrypted files