crowdstrike ccfr-201 practice test

CrowdStrike Certified Falcon Responder

Last exam update: Nov 18 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 60

Question 1

After pivoting to an event search from a detection, you locate the ProcessRollup2 event. Which two
field values are you required to obtain to perform a Process Timeline search so you can determine
what the process was doing?

  • A. SHA256 and TargetProcessld_decimal
  • B. SHA256 and ParentProcessld_decimal
  • C. aid and ParentProcessld_decimal
  • D. aid and TargetProcessld_decimal
Mark Question:
Answer:

D


Explanation:
According to the
CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide
v3.1.5+
,
the
Process
Timeline
search
requires
two
parameters: aid (agent
ID)
and TargetProcessId_decimal (the decimal value of the process ID).
These fields can be obtained from
the ProcessRollup2 event, which contains information about processes that have executed on a
host1
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

The function of Machine Learning Exclusions is to___________.

  • A. stop all detections for a specific pattern ID
  • B. stop all sensor data collection for the matching path(s)
  • C. Stop all Machine Learning Preventions but a detection will still be generated and files will still be uploaded to the CrowdStrike Cloud
  • D. stop all ML-based detections and preventions for the matching path(s) and/or stop files from being uploaded to the CrowdStrike Cloud
Mark Question:
Answer:

D


Explanation:
According to the
CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, Machine
Learning Exclusions allow you to exclude files or directories from being scanned by CrowdStrike’s
machine learning engine, which can reduce false positives and improve performance2
.
You can also
choose whether to upload the excluded files to the CrowdStrike Cloud or not2
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

What happens when you create a Sensor Visibility Exclusion for a trusted file path?

  • A. It excludes host information from Detections and Incidents generated within that file path location
  • B. It prevents file uploads to the CrowdStrike cloud from that file path
  • C. It excludes sensor monitoring and event collection for the trusted file path
  • D. It disables detection generation from that path, however the sensor can still perform prevention actions
Mark Question:
Answer:

C


Explanation:
According to the
CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, Sensor
Visibility Exclusions allow you to exclude certain files or directories from being monitored by the
CrowdStrike sensor, which can reduce noise and improve performance2
.
This means that no events
will be collected or sent to the CrowdStrike Cloud for those files or directories2
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

What types of events are returned by a Process Timeline?

  • A. Only detection events
  • B. All cloudable events
  • C. Only process events
  • D. Only network events
Mark Question:
Answer:

B


Explanation:
According to the
CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide
v3.1.5+, the Process Timeline search returns all cloudable events associated with a given process,
such as process creation, network connections, file writes, registry modifications, etc1
.
This allows
you to see a comprehensive view of what a process was doing on a host1
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

What is the difference between a Host Search and a Host Timeline?

  • A. Results from a Host Search return information in an organized view by type, while a Host Timeline returns a view of all events recorded by the sensor
  • B. A Host Timeline only includes process execution events and user account activity
  • C. Results from a Host Timeline include process executions and related events organized by data type. A Host Search returns a temporal view of all events for the given host
  • D. There is no difference - Host Search and Host Timeline are different names for the same search page
Mark Question:
Answer:

A


Explanation:
According to the
CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide
v3.1.5+, the Host Search allows you to search for hosts based on various criteria, such as hostname,
IP address, OS, etc1
.
The results are displayed in an organized view by type, such as detections,
incidents, processes, network connections, etc1
.
The Host Timeline allows you to view all events
recorded by the sensor for a given host in a chronological order1
.
The events include process
executions, file writes, registry modifications, network connections, user logins, etc1
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

When examining raw event data, what is the purpose of the field called ParentProcessld_decimal?

  • A. It contains an internal value not useful for an investigation
  • B. It contains the TargetProcessld_decimal value of the child process
  • C. It contains the Sensorld_decimal value for related events
  • D. It contains the TargetProcessld_decimal of the parent process
Mark Question:
Answer:

D


Explanation:
According to the
CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide
v3.1.5+, the ParentProcessld_decimal field contains the decimal value of the process ID of the parent
process that spawned or injected into the target process1
.
This field can be used to trace the process
lineage and identify malicious or suspicious activities1
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What action is used when you want to save a prevention hash for later use?

  • A. Always Block
  • B. Never Block
  • C. Always Allow
  • D. No Action
Mark Question:
Answer:

A


Explanation:
According to the
CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, the Always
Block action allows you to block a file from executing on any host in your organization based on its
hash value2
.
This action can be used to prevent known malicious files from running on your
endpoints2
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

A list of managed and unmanaged neighbors for an endpoint can be found:

  • A. by using Hosts page in the Investigate tool
  • B. by reviewing "Groups" in Host Management under the Hosts page
  • C. under "Audit" by running Sensor Visibility Exclusions Audit
  • D. only by searching event data using Event Search
Mark Question:
Answer:

A


Explanation:
According to the
CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, you can use
the Hosts page in the Investigate tool to view information about your endpoints, such as hostname,
IP address, OS, sensor version, etc2
.
You can also see a list of managed and unmanaged neighbors for
each endpoint, which are other devices that have communicated with that endpoint over the
network2
.
This can help you identify potential threats or vulnerabilities in your network2
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

What happens when a hash is allowlisted?

  • A. Execution is prevented, but detection alerts are suppressed
  • B. Execution is allowed on all hosts, including all other Falcon customers
  • C. The hash is submitted for approval to be allowed to execute once confirmed by Falcon specialists
  • D. Execution is allowed on all hosts that fall under the organization's CID
Mark Question:
Answer:

D


Explanation:
According to the
CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, the allowlist
feature allows you to exclude files or directories from being scanned or blocked by CrowdStrike’s
machine learning engine or indicators of attack (IOAs)2
.
This can reduce false positives and improve
performance2
.
When you allowlist a hash, you are allowing that file to execute on any host that
belongs to your organization’s CID (customer ID)2
.
This does not affect other Falcon customers or
hosts outside your CID2
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following is returned from the IP Search tool?

  • A. IP Summary information from Falcon events containing the given IP
  • B. Threat Graph Data for the given IP from Falcon sensors
  • C. Unmanaged host data from system ARP tables for the given IP D. IP Detection Summary information for detection events containing the given IP
Mark Question:
Answer:

A


Explanation:
According to the
CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide
v3.1.5+, the IP Search tool allows you to search for an IP address and view a summary of information
from Falcon events that contain that IP address1
.
The summary includes the hostname, sensor ID,
OS, country, city, ISP, ASN, and geolocation of the host that communicated with that IP address1
.

User Votes:
A
50%
B
50%
C
50%
Discussions
vote your answer:
A
B
C
0 / 1000

Question 11

Which is TRUE regarding a file released from quarantine?

  • A. No executions are allowed for 14 days after release
  • B. It is allowed to execute on all hosts
  • C. It is deleted
  • D. It will not generate future machine learning detections on the associated host
Mark Question:
Answer:

B


Explanation:
According to the
CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, when you
release a file from quarantine, you are restoring it to its original location and allowing it to execute
on any host in your organization2
.
This action also removes the file from the quarantine list and
deletes it from the CrowdStrike Cloud2
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following is an example of a MITRE ATT&CK tactic?

  • A. Eternal Blue
  • B. Defense Evasion
  • C. Emotet
  • D. Phishing
Mark Question:
Answer:

B


Explanation:
According to the [MITRE ATT&CK website], MITRE ATT&CK is a knowledge base of adversary
behaviors and techniques based on real-world observations. The knowledge base is organized into
tactics and techniques, where tactics are the high-level goals of an adversary, such as initial access,
persistence, lateral movement, etc., and techniques are the specific ways an adversary can achieve
those goals, such as phishing, credential dumping, remote file copy, etc. Defense Evasion is one of
the tactics defined by MITRE ATT&CK, which covers actions that adversaries take to avoid detection
or prevent security controls from blocking their activities. Eternal Blue, Emotet, and Phishing are
examples of techniques, not tactics.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

You notice that taskeng.exe is one of the processes involved in a detection. What activity should you
investigate next?

  • A. User logons after the detection
  • B. Executions of schtasks.exe after the detection
  • C. Scheduled tasks registered prior to the detection
  • D. Pivot to a Hash search for taskeng.exe
Mark Question:
Answer:

C


Explanation:
According to the [Microsoft website], taskeng.exe is a legitimate Windows process that is
responsible for running scheduled tasks. However, some malware may use this process or create a
fake one to execute malicious code. Therefore, if you notice taskeng.exe involved in a detection, you
should investigate whether there are any scheduled tasks registered prior to the detection that may
have triggered or injected into taskeng.exe. You can use tools such as schtasks.exe or Task Scheduler
to view or manage scheduled tasks.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Where can you find hosts that are in Reduced Functionality Mode?

  • A. Event Search
  • B. Executive Summary dashboard
  • C. Host Search
  • D. Installation Tokens
Mark Question:
Answer:

C


Explanation:
According to the
CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide
v3.1.5+, Reduced Functionality Mode (RFM) is a state where a host’s sensor has limited functionality
due to various reasons, such as license expiration, network issues, tampering attempts, etc1
.
You can
find hosts that are in RFM by using the Host Search tool and filtering by Sensor Status = RFM1
.
You
can also view details about why a host is in RFM by clicking on its hostname1
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

From the Detections page, how can you view 'in-progress' detections assigned to Falcon Analyst
Alex?

  • A. Filter on'Analyst: Alex'
  • B. Alex does not have the correct role permissions as a Falcon Analyst to be assigned detections
  • C. Filter on 'Hostname: Alex' and 'Status: In-Progress'
  • D. Filter on 'Status: In-Progress' and 'Assigned-to: Alex*
Mark Question:
Answer:

D


Explanation:
According to the
CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, the Detections
page allows you to view and manage detections generated by the CrowdStrike Falcon platform2
.
You
can use various filters to narrow down the detections based on criteria such as status, severity, tactic,
technique, etc2
.
To view ‘in-progress’ detections assigned to Falcon Analyst Alex, you can filter on
‘Status: In-Progress’ and 'Assigned-to: Alex*'2
.
The asterisk (*) is a wildcard that matches any
characters after Alex2
.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2