CrowdStrike Certified Falcon Responder CCFR-201 Exam Practice Test

Page: 1 / 14
Total 60 questions
Question 1

You are reviewing the raw data in an event search from a detection tree. You find a FileOpenlnfo event and want to find out if any other files were opened by the responsible process. Which two field values do you need from this event to perform a Process Timeline search?



Question 2
Question 3

The function of Machine Learning Exclusions is to___________.



Question 4

Which of the following is returned from the IP Search tool?



Question 5

Aside from a Process Timeline or Event Search, how do you export process event data from a detection in .CSV format?



Question 6
Question 7

Which of the following is an example of a MITRE ATT&CK tactic?



Answer : B

According to the [MITRE ATT&CK website], MITRE ATT&CK is a knowledge base of adversary behaviors and techniques based on real-world observations. The knowledge base is organized into tactics and techniques, where tactics are the high-level goals of an adversary, such as initial access, persistence, lateral movement, etc., and techniques are the specific ways an adversary can achieve those goals, such as phishing, credential dumping, remote file copy, etc. Defense Evasion is one of the tactics defined by MITRE ATT&CK, which covers actions that adversaries take to avoid detection or prevent security controls from blocking their activities. Eternal Blue, Emotet, and Phishing are examples of techniques, not tactics.


Page:    1 / 14   
Total 60 questions