CrowdStrike CCFH-202 Exam Practice Questions (P. 4)
- Full Access (88 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
Which of the following queries will return the parent processes responsible for launching badprogram.exe?
- A[search (ParentProcess) where name=badprogram.exe ] | table ParentProcessName _time
- Bevent_simpleName=processrollup2 [search event_simpleName=processrollup2 FileName=badprogram.exe | rename ParentProcessId_decimal AS TargetProcessId_decimal | fields aid TargetProcessId_decimal] | stats count by FileName _timeMost Voted
- C[search (ProcessList) where Name=badprogram.exe ] | search ParentProcessName | table ParentProcessName _time
- Devent_simpleName=processrollup2 [search event_simpleName=processrollup2 FileName=badprogram.exe | rename TargetProcessId_decimal AS ParentProcessId_decimal | fields aid TargetProcessId_decimal] | stats count by FileName _time
Correct Answer:
C
C
send
light_mode
delete
Question #17
You want to produce a list of all event occurrences along with selected fields such as the full path, time, username etc. Which command would be the appropriate choice?
send
light_mode
delete
Question #18
When exporting the results of the following event search, what data is saved in the exported file (assuming Verbose Mode)? event_simpleName=*Written | stats count by ComputerName
- AThe text of the query
- BThe results of the Statistics tabMost Voted
- CNo data. Results can only be exported when the “table” command is used
- DAll events in the Events tab
Correct Answer:
B
B
send
light_mode
delete
Question #19
The help desk is reporting an increase in calls related to user accounts being locked out over the last few days. You suspect that this could be an attack by an adversary against your organization. Select the best hunting hypothesis from the following:
- AA zero-day vulnerability is being exploited on a Microsoft Exchange server
- BA publicly available web application has been hacked and is causing the lockouts
- CUsers are locking their accounts out because they recently changed their passwords
- DA password guessing attack is being executed against remote access mechanisms such as VPN
Correct Answer:
D
D
send
light_mode
delete
Question #20
To find events that are outliers inside a network, ___________is the best hunting method to use.
send
light_mode
delete
All Pages