Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CCFH-202b Exam Dumps - CrowdStrike CCFH Questions and Answers

Question # 14

What is the purpose of this query?

#event_simpleName=UserLogon LogonType=10 RemoteAddressIP4=* | !cidr(RemoteAddressIP4, subnet=["224.0.0.0/4", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "127.0.0.0/8", "169.254.0.0/16", "0.0.0.0/32"]) | ipLocation(RemoteAddressIP4) | worldMap(ip=RemoteAddressIP4, magnitude=count(aid))

Options:

A.

Display all locations for local subnets on a map

B.

Display all users who are logging in from private IP ranges on a map

C.

Display geolocation data for all network logins on a map

D.

Display geolocation data for RDP connections on a map

Buy Now
Question # 15

Which pre-defined reports will show activities that typically indicate suspicious activity occurring on a system?

Options:

A.

Sensor reports

B.

Timeline reports

C.

Scheduled searches

D.

Hunt reports

Buy Now
Question # 16

According to the MITRE ATT & CK Framework, if an adversary is trying to Gain Access by Credential Access via OS Credential Dumping, what is the specific attacker's technique that you can also use as a filter on the detections page to find similar activities?

Options:

A.

Gain Access

B.

OS Credential Dumping

C.

Credential Access

D.

Lateral Movement

Buy Now
Question # 17

Which CQL query would output relevant data in tracking USB storage device usage?

Options:

A.

#event_simpleName=RemovableMediaVolumeMounted | table([@timestamp, ComputerName, VolumeDriveLetter, VolumeFileSystemDevice, VolumeFileSystemDriver])

B.

#event_simpleName=RemovableMediaVolumeMounted | table([RemoteAddressIP4, UserName, ParentProcessId, RawProcessId, TargetProcessId, FileName, MD5HashData, SHA256HashData, aid, cid])

C.

#event_simpleName=ProcessRollup2 event_platform=Win | table(["Host Name", "Connection Type", "Manufacturer", "Product Name", "Description", "Device ID", Time])

D.

#event_simpleName=FsVolumeMounted | table([@source, ComputerName, VolumeName, VolumeFileSystemType, Entitlements, VolumeDriveLetter])

Buy Now
Question # 18

A compromised host shows evidence that the net user hacker password!23 /add /domain command was executed. Which MITRE ATT & CK technique does this align with?

Options:

A.

Account Manipulation

B.

Acquire Access

C.

Valid Accounts

D.

Create Account

Buy Now
Question # 19

A detection contains a suspicious process named "reallysus.exe". This process has a TargetProcessId of 123456789. Which query will return all of the events associated with this process?

Options:

A.

TargetProcessId=123456789 OR ParentProcessId=123456789 OR RpcClientProcessId=123456789

B.

#event_simpleName=ProcessRollup2 FileName=reallysus.exe

C.

#event_simpleName=ProcessRollup2 TargetProcessId=123456789

D.

TargetProcessId=123456789 OR ContextProcessId=123456789 OR RpcClientProcessId=123456789

Buy Now
Question # 20

Which hunting query's results could indicate that an adversary is performing reconnaissance from a specific host?

Options:

A.

#event_simpleName=ProcessRollup2 | aid=?aid | ImageFileName=/ (? < FileName > [^\\\/]*)$ / | FileName=/^(explorer|lsass|svchost|smss|winlogon|userinit)\.exe$/i | table([aid, UserName, ParentBaseFileName, ImageFileName, CommandLine] , limit=1000)

B.

#event_simpleName=NetworkScanEvent | aid=?aid | !cidr(RemoteAddressIP4, subnet=["224.0.0.0/4", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "127.0.0.0/8", "169.254.0.0/16", "0.0.0.0/32"]) | table([aid, UserName, ParentBaseFileName, ImageFileName, CommandLine] , limit=1000)

C.

#event_simpleName=NetworkConnect* | RemotePort=?RemotePort aid=?aid | !cidr(RemoteAddressIP4, subnet=["224.0.0.0/4", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "127.0.0.0/8", "169.254.0.0/16", "0.0.0.0/32"]) | table([aid, LocalAddressIP4, LocalPort, RemoteAddressIP4, RemotePort] , limit=1000)

D.

#event_simpleName=ProcessRollup2 | aid=?aid | ImageFileName=/ (? < FileName > [^\\\/]*)$ / | FileName=/^(net|ipconfig|whoami|quser|ping|netstat|tasklist|hostname|at)\.exe$/i | table([aid, UserName, ParentBaseFileName, ImageFileName, CommandLine] , limit=1000)

Buy Now
Question # 21

Which action helps identify an enterprise-wide file infection?

Options:

A.

Monitor the Falcon Console for alerts on suspicious process activity

B.

Analyze the Investigate Host dashboard to identify endpoints with high-risk file activity

C.

Utilize CrowdStrike Query Language (CQL) to search for files with the same hashes that have been renamed

D.

Utilize the IP addresses Investigate dashboard to find the hosts' processes that are connecting to an unusual IP

Buy Now
Exam Code: CCFH-202b
Exam Name: CrowdStrike Certified Falcon Hunter
Last Update: Apr 5, 2026
Questions: 60
CCFH-202b pdf

CCFH-202b PDF

$25.5  $84.99
CCFH-202b Engine

CCFH-202b Testing Engine

$28.5  $94.99
CCFH-202b PDF + Engine

CCFH-202b PDF + Testing Engine

$40.5  $134.99