Pre-Summer Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

CrowdStrike Falcon Certification Program Question and Answers

CrowdStrike Falcon Certification Program

Last Update May 24, 2026
Total Questions : 100

We are offering FREE CCFA-200b CrowdStrike exam questions. All you do is to just go and sign up. Give your details, prepare CCFA-200b free exam questions and then go for complete pool of CrowdStrike Falcon Certification Program test questions that will help you more.

CCFA-200b pdf

CCFA-200b PDF

$36.75  $104.99
CCFA-200b Engine

CCFA-200b Testing Engine

$43.75  $124.99
CCFA-200b PDF + Engine

CCFA-200b PDF + Testing Engine

$57.75  $164.99
Questions 1

Which role allows a Falcon user to create Real Time Response Custom Scripts?

Options:

A.  

Real Time Responder – Active Responder

B.  

Real Time Responder – Administrator

C.  

Real Time Responder – Read Only Analyst

D.  

Real Time Responder – Script Developer

Discussion 0
Questions 2

You are attempting to install the Falcon sensor on a host with a slow internet connection, and the installation fails after 20 minutes. What parameter can be used to override the 20-minute default provisioning window?

Options:

A.  

Timeout=30

B.  

ProvNoWait=1

C.  

Timeout=0

D.  

DelayedStart=1

Discussion 0
Questions 3

Your development team is working on a new enterprise application, but Falcon starts creating alerts during testing. The alert points to “C:\Users\Bob\DevCode\felix.dll”. In the detection, you see that it is triggering only on a specific Falcon IOA. What would be the best course of action for this situation?

Options:

A.  

Create an IOA exclusion for “C:\Users\Bob\DevCode\felix.dll”

B.  

Create a Custom IOC and set it to “Allow” for “C:\Users\Bob\DevCode\felix.dll”

C.  

Manually turn off the built-in IOA through prevention policies

D.  

Create a sensor visibility exclusion for “C:\Users\Bob\DevCode\felix.dll”

Discussion 0
Questions 4

When using Microsoft Windows, what command verifies that a Falcon Sensor is running?

Options:

A.  

cswindiag.exe -status

B.  

sc.exe query csagent

C.  

netstat.exe -f

D.  

sc.exe query falcon

Discussion 0
Questions 5

Where would you apply a configuration to allow IP addresses over which your hosts will always be allowed to communicate, even if a host is contained?

Options:

A.  

IP Allowlist Management

B.  

Containment Policy

C.  

Response Policies

D.  

Maintenance Token

Discussion 0
Questions 6

You are tasked with creating a “Workstations” host group to encompass all workstations in your environment. Which dynamic grouping criteria will most efficiently accomplish this task?

Options:

A.  

OU Workstation

B.  

Grouping Tags Workstation

C.  

Type: Workstation

D.  

Platform Windows

Discussion 0
Questions 7

Your leadership wants controls in place for immediate action on any Overwatch detections. What should you do to ensure the host is contained quickly and notifies the appropriate staff?

Options:

A.  

Create a Fusion SOAR workflow to contain the host and email the Overwatch team

B.  

Create a Fusion SOAR workflow to create a detection for Overwatch and email the SOC team

C.  

Create a Fusion SOAR workflow to trigger on an Overwatch detection and set it to block the detection

D.  

Create a Fusion SOAR workflow using the Overwatch playbook to contain the host and email the SOC team

Discussion 0
Questions 8

When searching for a host network address, which IP notation should be used?

Options:

A.  

10 10105,1010108

B.  

1010102,10 10107

C.  

192.168.5.1/24

D.  

192 168 5 1-100

Discussion 0
Questions 9

There are a significant number of false positive detections from your developers that are getting blocked and quarantined by Falcon. What Indicator of Compromise (IOC) action would be the best option?

Options:

A.  

Detect Only

B.  

Allow

C.  

Prevent

D.  

No action

Discussion 0
Questions 10

A host has been Network Contained with Falcon and you have been asked to urgently update the Operating System with patches. You have tried using your patch update systems, but the jobs fail. Which configuration steps in the Falcon UI will allow these activities?

Options:

A.  

Create a Containment Policy that allow lists the FQDN of your patch management tools

B.  

Create a Containment Policy that allow lists the specific IP addresses of your patch management tools

C.  

Adjust the Content Update Policies to Early Access with No Delay

D.  

Create an IP group in IP Allowlist Management

Discussion 0
Questions 11

What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?

Options:

A.  

Host Modification Protection

B.  

System Configuration Protection

C.  

Sensor Tampering Protection

D.  

Sensor Modification Protection

Discussion 0
Questions 12

What is the fastest way to locate inactive sensors in the Falcon console?

Options:

A.  

Sort hosts by Last Seen timestamp

B.  

Export all host data to CSV

C.  

Filter the Host Management page to show inactive hosts

D.  

Search for hosts with no Agent ID

Discussion 0
Questions 13

What happens to detections in the console after clicking “Disable Detections” for a host from within the Host Management page?

Options:

A.  

All detection data for the host is deleted and the host is hidden from view

B.  

Existing detections for the host remain

C.  

New detections are disabled for 30 days

D.  

The detections for the host are removed from the console immediately

Discussion 0
Questions 14

Where can you find hosts that have been offline for ten minutes or longer?

Options:

A.  

Host Management

B.  

Sensor Coverage Dashboard

C.  

Host Groups

Discussion 0
Questions 15

In order to prevent duplicate Agent IDs, what install parameter should be used on VMs to be used as persistent clones?

Options:

A.  

ProvNoWait=1

B.  

VDI=true

C.  

NO_START=1

D.  

VM=True

Discussion 0
Questions 16

How are sensor updates managed and enforced across multiple hosts in Falcon?

Options:

A.  

Prevention policies assigned to host groups

B.  

Manual updates on each host

C.  

Sensor update policies assigned to host groups

D.  

Direct installation

Discussion 0
Questions 17

What type of information is provided in sensor health report?

Options:

A.  

User login history

B.  

Local performance metrics

C.  

Current operational status

D.  

Network traffic patterns

Discussion 0
Questions 18

When configuring a third-party integration to communicate with the Falcon API, which credential combination must be generated first?

Options:

A.  

Access Key and Secret Key

B.  

Integration Key and Customer ID

C.  

API Client and Secret Key

D.  

OAuth2 Token and Client Secret

Discussion 0
Questions 19

What is the primary purpose of custom IOA rules?

Options:

A.  

Block known malware

B.  

Identify malicious behavior

C.  

Manage system updates

D.  

Configure network settings

Discussion 0
Questions 20

Excluding mobile devices, what kind of hosts can be contained in Falcon?

Options:

A.  

Windows and MacOS hosts running the Falcon sensor

B.  

Windows and Linux hosts running the Falcon sensor

C.  

Windows, Linux, and container hosts running the Falcon sensor

D.  

Windows, Linux, and MacOS hosts running the Falcon sensor

Discussion 0
Questions 21

Using Host setup and management inside the Falcon Console, how can you display sensors in Reduced Functionality Mode?

Options:

A.  

From Host management, filter for RFM

B.  

From Host status, filter for RFM

C.  

From Sensor health, sort using the column heading Sensor status

D.  

From Sensor status, click on the widget RFM

Discussion 0
Questions 22

Why would you add IP addresses to a containment policy?

Options:

A.  

You want to automate the Network Containment process based on the IP address of a host

B.  

A new group of analysts need to be able to place hosts under Network Containment

C.  

Your organization has resources that need to be accessible when hosts are network contained

D.  

Your organization has additional IP addresses that need to be able to access the Falcon console

Discussion 0
Questions 23

What are the components that must be allowed to manually install Falcon Sensor on macOS?

Options:

A.  

Network filter extension and Full Disk Access only

B.  

Full Disk Access and System extension only

C.  

Network filter extension and System extension only

D.  

System extension, Full Disk Access, and Network filter extension

Discussion 0
Questions 24

A new prevention policy has been created for assignment to the group named “Servers”. When you try to apply the policy, the “Servers” group is not available. What is the most likely reason the group is not available?

Options:

A.  

The “Servers” group must be disabled first

B.  

The “Servers” group already has a prevention policy applied to it

C.  

Host type was not defined correctly within the prevention policy

D.  

The new prevention policy should be enabled first

Discussion 0
Questions 25

After enabling an IOA rule and its respective rule group, what else must be done for an IOA to be fully functional?

Options:

A.  

The rule must be manually triggered

B.  

Hosts must be individually selected to apply to the rule

C.  

The rule group must be assigned to a prevention policy

Discussion 0
Questions 26

How are custom roles assigned to users to perform a specific action on a module?

Options:

A.  

Users get all permissions by default

B.  

Permissions are enabled in roles, and these roles are assigned to users

C.  

By adding each module to a role

D.  

Permissions are assigned to users directly in user management

Discussion 0
Questions 27

What log would you use to investigate unusual activity invoked with a script interfacing with the Falcon platform?

Options:

A.  

Falcon UI audit

B.  

RTR session audit

C.  

Prevention policy debug

D.  

API audit

Discussion 0
Questions 28

To improve the organization’s security posture, you are designing a Fusion SOAR workflow to generate an alert when critical vulnerabilities are detected by Falcon. When creating a new workflow from scratch, what component of the workflow must be configured first?

Options:

A.  

Action

B.  

Trigger

C.  

Condition

D.  

Workflow Name

Discussion 0
Questions 29

A host has been Network contained with Falcon and you have been asked to update the Operating System with zero day patches. You have tried using your patch update systems for this task, but the jobs fail. Which configuration steps in the Falcon UI will allow these activities?

Options:

A.  

Create a Containment Policy that allow lists the specific IP addresses of your patch management tools

B.  

Create a Containment Policy that allow lists the Fully Qualified name of your patch management tools

C.  

Remove Host containment and update the host with all patches

D.  

Create a Firewall Policy that allow lists your patch management tools

Discussion 0
Questions 30

You can create Fusion SOAR workflows to precisely define the actions you want Falcon to perform in response to incidents. Which three items must be defined in every trigger so that it executes successfully?

Options:

A.  

Trigger, Condition, Action

B.  

Rule Type, Condition, Action

C.  

Rule Type, Filter, Objective

D.  

Trigger, Filter, Objective

Discussion 0