Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CCFA-200 CrowdStrike Certified Falcon Administrator Questions and Answers

Questions 4

You have a Windows host on your network in Reduced functionality mode (RFM). While the system is in RFM, which of the following is TRUE?

Options:

A.

System monitoring will be unavailable

B.

Event reporting will be unavailable

C.

Prevention patterns will not be triggered

D.

Some detection patterns and preventions will not be triggered

Buy Now
Questions 5

Custom IOA rules are defined using which syntax?

Options:

A.

Glob

B.

PowerShell

C.

Yara

D.

Regex

Buy Now
Questions 6

When uninstalling a sensor, which of the following is required if the 'Uninstall and maintenance protection' setting is enabled within the Sensor Update Policies?

Options:

A.

Maintenance token

B.

Customer ID (CID)

C.

Bulk update key

D.

Agent ID (AID)

Buy Now
Questions 7

The Falcon sensor uses certificate pinning to defend against man-in-the-middle attacks. Which statement is TRUE concerning Falcon sensor certificate validation?

Options:

A.

SSL inspection should be configured to occur on all Falcon traffic

B.

Some network configurations, such as deep packet inspection, interfere with certificate validation

C.

HTTPS interception should be enabled to proceed with certificate validation

D.

Common sources of interference with certificate pinning include protocol race conditions and resource contention

Buy Now
Questions 8

When would the No Action option be assigned to a hash in IOC Management?

Options:

A.

When you want to save the indicator for later action, but do not want to block or allow it at this time

B.

Add the indicator to your allowlist and do not detect it

C.

There is no such option as No Action available in the Falcon console

D.

Add the indicator to your blocklist and show it as a detection

Buy Now
Questions 9

What is the purpose of the Default Sensor Policy?

Options:

A.

A mechanism to deploy the oldest supported version of the Falcon Sensor.

B.

Tests the sensor configuration settings before deployment.

C.

Used to reset all sensor settings to Default.

D.

Acts as a "catch all" policy if no other Sensor Policies are applied.

Buy Now
Questions 10

Why would you assign hosts to a static group instead of a dynamic group?

Options:

A.

You do not want the group membership to change automatically

B.

You are managing more than 1000 hosts

C.

You need hosts to be automatically assigned to a group

D.

You want the group to contain hosts from multiple operating systems

Buy Now
Questions 11

How can you find a list of hosts that have not communicated with the CrowdStrike Cloud in the last 30 days?

Options:

A.

Under Dashboards and reports, choose the Sensor Report. Set the "Last Seen" dropdown to 30 days and reference the Inactive Sensors widget

B.

Under Host setup and management, choose the Host Management page. Set the group filter to "Inactive Sensors"

C.

Under Host setup and management > Managed endpoints > Inactive Sensors. Change the time range to 30 days

D.

Under Host setup and management, choose the Disabled Sensors Report. Change the time range to 30 days

Buy Now
Questions 12

When troubleshooting the Falcon Sensor on Windows, what is the correct parameter to output the log directory to a specified file?

Options:

A.

LOG=log.txt

B.

\log log.txt

C.

C:\CSSensorlnstall\LogFiles

D.

/log log.txt

Buy Now
Questions 13

An analyst is asked to retrieve an API client secret from a previously generated key. How can they achieve this?

Options:

A.

The API client secret can be viewed from the Edit API client pop-up box

B.

Enable the Client Secret column to reveal the API client secret

C.

Re-create the API client using the exact name to see the API client secret

D.

The API client secret cannot be retrieved after it has been created

Buy Now
Questions 14

On the Host management page which filter could be used to quickly identify all devices categorized as a "Workstation" by the Falcon Platform?

Options:

A.

Status

B.

Platform

C.

Hostname

D.

Type

Buy Now
Questions 15

Once an exclusion is saved, what can be edited in the future?

Options:

A.

All parts of the exclusion can be changed

B.

Only the selected groups and hosts to which the exclusion is applied can be changed

C.

Only the options to "Detect/Block" and/or "File Extraction" can be changed

D.

The exclusion pattern cannot be changed

Buy Now
Questions 16

When creating a custom IOA for a specific domain, which syntax would be best for detecting or preventing on all subdomains as well?

Options:

A.

*\.baddomain\.xyz|baddomain\. xyz

B.

*baddomain\. xyz|baddomain\. xyz. *

C.

Custom IOA rules cannot be created for domains

D.

**baddomain\. xyz|baddomain\. xyz**

Buy Now
Questions 17

In order to exercise manual control over the sensor upgrade process, as well as prevent unauthorized users from uninstalling or upgrading the sensor, which settings in the Sensor Update Policy would meet this criteria?

Options:

A.

Sensor version set to N-1 and Bulk maintenance mode is turned on

B.

Sensor version fixed and Uninstall and maintenance protection turned on

C.

Sensor version updates off and Uninstall and maintenance protection turned off

D.

Sensor version set to N-2 and Bulk maintenance mode is turned on

Buy Now
Questions 18

On a Windows host, what is the best command to determine if the sensor is currently running?

Options:

A.

sc query csagent

B.

netstat -a

C.

This cannot be accomplished with a command

D.

ping falcon.crowdstrike.com

Buy Now
Questions 19

What are custom alerts based on?

Options:

A.

Custom workflows

B.

Custom event based triggers

C.

Predefined alert templates

D.

User defined Splunk queries

Buy Now
Questions 20

While a host is Network contained, you need to allow the host to access internal network resources on specific IP addresses to perform patching and remediation. Which configuration would you choose?

Options:

A.

Configure a Real Time Response policy allowlist with the specific IP addresses

B.

Configure a Containment Policy with the specific IP addresses

C.

Configure a Containment Policy with the entire internal IP CIDR block

D.

Configure the Host firewall to allowlist the specific IP addresses

Buy Now
Questions 21

Which of the following Machine Learning (ML) sliders will only detect or prevent high confidence malicious items?

Options:

A.

Aggressive

B.

Cautious

C.

Minimal

D.

Moderate

Buy Now
Questions 22

You have been provided with a list of 100 hashes that are not malicious but your company has deemed to be inappropriate for work computers. They have asked you to ensure that they are not allowed to run in your environment. You have chosen to use Falcon to do this. Which is the best way to accomplish this?

Options:

A.

Using the Support Portal, create a support ticket and include the list of binary hashes, asking support to create an "Execution Prevention" rule to prevent these processes from running

B.

Using Custom Alerts in the Investigate App, create a new alert using the template "Process Execution" and within that rule, select the option to "Block Execution"

C.

Using IOC Management, gather the list of SHA256 or MD5 hashes for each binary and then upload them. Set all hashes to "Block" and ensure that the prevention policy these computers are using includes the option for "Custom Blocking" under Execution Blocking.

D.

Using the API, gather the list of SHA256 or MD5 hashes for each binary and then upload them, setting them all to "Never Allow"

Buy Now
Questions 23

The Falcon Administrator has created a new prevention policy to apply to the "Servers" group; however, when applying the new prevention policy this group is not appearing in the list of available groups. What is the most likely issue?

Options:

A.

The new prevention policy should be enabled first

B.

The "Servers" group already has a policy applied to it

C.

The "Servers" group must be disabled first

D.

Host type was not defined correctly within the prevention policy

Buy Now
Questions 24

The Customer ID (CID) is important in which of the following scenarios?

Options:

A.

When adding a user to the Falcon console under the Users application

B.

When performing the sensor installation process

C.

When setting up API keys

D.

When performing a Host Search

Buy Now
Questions 25

How can a Falcon Administrator configure a pop-up message to be displayed on a host when the Falcon sensor blocks, kills or quarantines an activity?

Options:

A.

By ensuring each user has set the "pop-ups allowed" in their User Profile configuration page

B.

By enabling "Upload quarantined files" in the General Settings configuration page

C.

By turning on the "Notify End Users" setting at the top of the Prevention policy details configuration page

D.

By selecting "Enable pop-up messages" from the User configuration page

Buy Now
Questions 26

Which of the following scenarios best describes when you would add IP addresses to the containment policy?

Options:

A.

You want to automate the Network Containment process based on the IP address of a host

B.

Your organization has additional IP addresses that need to be able to access the Falcon console

C.

A new group of analysts need to be able to place hosts under Network Containment

D.

Your organization has resources that need to be accessible when hosts are network contained

Buy Now
Questions 27

You want the Falcon Cloud to push out sensor version changes but you also want to manually control when the sensor version is upgraded or downgraded. In the Sensor Update policy, which is the best Sensor version option to achieve these requirements?

Options:

A.

Specific sensor version number

B.

Auto - TEST-QA

C.

Sensor version updates off

D.

Auto - N-1

Buy Now
Questions 28

When performing targeted filtering for a host on the Host Management Page, which filter bar attribute is NOT case-sensitive?

Options:

A.

Username

B.

Model

C.

Domain

D.

Hostname

Buy Now
Questions 29

What type of information is found in the Linux Sensors Dashboard?

Options:

A.

Hosts by Kernel Version, Shells spawned by Root, Wget/Curl Usage

B.

Hidden File execution, Execution of file from the trash, Versions Running with Computer Names

C.

Versions running, Directory Made Invisible to Spotlight, Logging/Auditing Referenced, Viewed, or Modified

D.

Private Information Accessed, Archiving Tools – Exfil, Files Made Executable

Buy Now
Questions 30

What impact does disabling detections on a host have on an API?

Options:

A.

Endpoints with detections disabled will not alert on anything until detections are enabled again

B.

Endpoints cannot have their detections disabled individually

C.

DetectionSummaryEvent stops sending to the Streaming API for that host

D.

Endpoints with detections disabled will not alert on anything for 24 hours (by default) or longer if that setting is changed

Buy Now
Questions 31

How long are detection events kept in Falcon?

Options:

A.

Detection events are kept for 90 days

B.

Detections events are kept for your subscribed data retention period

C.

Detection events are kept for 7 days

D.

Detection events are kept for 30 days

Buy Now
Questions 32

On which page of the Falcon console would you create sensor groups?

Options:

A.

User management

B.

Sensor update policies

C.

Host management

D.

Host groups

Buy Now
Questions 33

Which of the following can a Falcon Administrator edit in an existing user's profile?

Options:

A.

First or Last name

B.

Phone number

C.

Email address

D.

Working groups

Buy Now
Questions 34

An analyst has reported they are not receiving workflow triggered notifications in the past few days. Where should you first check for potential failures?

Options:

A.

Custom Alert History

B.

Workflow Execution log

C.

Workflow Audit log

D.

Falcon UI Audit Trail

Buy Now
Questions 35

You want to create a detection-only policy. How do you set this up in your policy's settings?

Options:

A.

Enable the detection sliders and disable the prevention sliders. Then ensure that Next Gen Antivirus is enabled so it will disable Windows Defender.

B.

Select the "Detect-Only" template. Disable hash blocking and exclusions.

C.

You can't create a policy that detects but does not prevent. Use Custom IOA rules to detect.

D.

Set the Next-Gen Antivirus detection settings to the desired detection level and all the prevention sliders to disabled. Do not activate any of the other blocking or malware prevention options.

Buy Now
Questions 36

What should be disabled on firewalls so that the sensor's man-in-the-middle attack protection works properly?

Options:

A.

Deep packet inspection

B.

Linux Sub-System

C.

PowerShell

D.

Windows Proxy

Buy Now
Questions 37

How can a API client secret be viewed after it has been created?

Options:

A.

Within the API management page, API client secrets can be accessed within the "edit client" functionality

B.

The API client secret must be reset or a new client created as the secret cannot be viewed after it has been created

C.

The API client secret can be provided by support via direct email request from a Falcon Administrator

D.

Selecting "show secret" within the 3-dot dropdown menu will reveal the secret for the selected api client

Buy Now
Questions 38

How many "Auto" sensor version update options are available for Windows Sensor Update Policies?

Options:

A.

1

B.

2

C.

0

D.

3

Buy Now
Questions 39

Which is a filter within the Host setup and management > Host management page?

Options:

A.

User name

B.

OU

C.

BIOS Version

D.

Locality

Buy Now
Questions 40

With Custom Alerts, it is possible to __________.

Options:

A.

schedule the alert to run at any interval

B.

receive an alert in an email

C.

configure prevention actions for alerting

D.

be alerted to activity in real-time

Buy Now
Questions 41

One of your development teams is working on code for a new enterprise application but Falcon continually flags the execution as a detection during testing. All development work is required to be stored on a file share in a folder called "devcode." What setting can you use to reduce false positives on this file path?

Options:

A.

USB Device Policy

B.

Firewall Rule Group

C.

Containment Policy

D.

Machine Learning Exclusions

Buy Now
Questions 42

Under the "Next-Gen Antivirus: Cloud Machine Learning" setting there are two categories, one of them is "Cloud Anti-Malware" and the other is:

Options:

A.

Adware & PUP

B.

Advanced Machine Learning

C.

Sensor Anti-Malware

D.

Execution Blocking

Buy Now
Questions 43

Which is the correct order for manually installing a Falcon Package on a macOS system?

Options:

A.

Install the Falcon package, then register the Falcon Sensor via the registration package

B.

Install the Falcon package, then register the Falcon Sensor via command line

C.

Register the Falcon Sensor via command line, then install the Falcon package

D.

Register the Falcon Sensor via the registration package, then install the Falcon package

Buy Now
Questions 44

When a host belongs to more than one host group, how is sensor update precedence determined?

Options:

A.

Groups have no impact on sensor update policies

B.

Sensors of hosts that belong to more than one group must be manually updated

C.

The highest precedence policy from the most important group is applied to the host

D.

All of the host's groups are examined in aggregate and the policy with highest precedence is applied to the host

Buy Now
Exam Code: CCFA-200
Exam Name: CrowdStrike Certified Falcon Administrator
Last Update: Sep 11, 2025
Questions: 153

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99