CrowdStrike - Big Savings Alert – Don’t Miss This Deal - Ends In 1d 00h 00m 00s Coupon code: 26Y30OFF
  1. Home
  2. CrowdStrike
  3. CCFH-202b Exam
  4. Free CCFH-202b Questions

Free Practice Questions for CrowdStrike CCFH-202b Exam

Pass4Future also provide interactive practice exam software for preparing CrowdStrike Certified Falcon Hunter (CCFH-202b) Exam effectively. You are welcome to explore sample free CrowdStrike CCFH-202b Exam questions below and also try CrowdStrike CCFH-202b Exam practice test software.

Page:    1 / 14   
Total 60 questions

Question 1

Which of the following does the Hunting and Investigation Guide contain?



Answer : C

The Hunting and Investigation guide contains example Event Search queries useful for threat hunting. These queries are based on common threat hunting use cases and scenarios, such as finding suspicious processes, network connections, registry activity, etc. The guide also explains how to customize and modify the queries to suit different needs and environments. The guide does not contain a list of all event types and their syntax, as that information is provided in the Events Data Dictionary. The guide also does not contain example Event Search queries useful for Falcon platform configuration, as that is not the focus of the guide.


Question 2

What information is provided from the MITRE ATT&CK framework in a detection's Execution Details?



Answer : C

Technique ID is the information that is provided from the MITRE ATT&CK framework in a detection's Execution Details. Technique ID is a unique identifier for each technique in the MITRE ATT&CK framework, such as T1059 for Command and Scripting Interpreter or T1566 for Phishing. Technique ID helps to map a detection to a specific adversary behavior and tactic. Grouping Tag, Command Line, and Triggering Indicator are not information that is provided from the MITRE ATT&CK framework in a detection's Execution Details.


Question 3

You would like to search for ANY process execution that used a file stored in the Recycle Bin on a Windows host. Select the option to complete the following EAM query.



Answer : B

This option is the correct one to complete the following EAM query:

event_simpleName=ProcessRollup2 FileName=$Recycle Bin

This query would search for any process execution that used a file stored in the Recycle Bin on a Windows host, as the asterisk (*) is a wildcard character that matches any number of characters before or after the specified string. The other options are not correct, as they use different wildcard characters that do not match the desired pattern.


Question 4

Which threat framework allows a threat hunter to explore and model specific adversary tactics and techniques, with links to intelligence and case studies?



Answer : A

MITRE ATT&CK is a threat framework that allows a threat hunter to explore and model specific adversary tactics and techniques, with links to intelligence and case studies. It is a knowledge base of adversary behaviors and tactics that covers various platforms, domains, and scenarios. It provides a common language and structure for threat hunters to understand and analyze threats, as well as to share findings and recommendations.


Question 5

Which of the following is a recommended technique to find unique outliers among a set of data in the Falcon Event Search?



Answer : B

Stacking (Frequency Analysis) is a recommended technique to find unique outliers among a set of data in the Falcon Event Search. As explained above, stacking involves grouping events by a common attribute and counting their frequency, then sorting them by ascending or descending order to identify rare or common events. This can help find anomalies or deviations from normal behavior that could indicate malicious activity. Hunt-and-Peck Search Methodology, Time-based Searching, and Machine Learning are not specific techniques to find unique outliers among a set of data.


Page:    1 / 14   
Total 60 questions