Exam Details

  • Exam Code
    :CCFA-200
  • Exam Name
    :CrowdStrike Certified Falcon Administrator
  • Certification
    :CrowdStrike Certifications
  • Vendor
    :CrowdStrike
  • Total Questions
    :186 Q&As
  • Last Updated
    :Mar 23, 2025

CrowdStrike CrowdStrike Certifications CCFA-200 Questions & Answers

  • Question 11:

    What best describes the relationship between Sensor Update policies and Operating Systems?

    A. Windows and Mac share Sensor Update policies. Linux requires its own set of polices based on the different kernel versions

    B. Sensor Update polices are not Operating System specific. One policy can be applied to all Operating Systems

    C. Windows has its own Sensor Update polices. But Mac and Linux share Sensor Update policies

    D. A Sensor Update policy must be configured for each Operating System (Windows, Mac, Linux)

  • Question 12:

    In order to exercise manual control over the sensor upgrade process, as well as prevent unauthorized users from uninstalling or upgrading the sensor, which settings in the Sensor Update Policy would meet this criteria?

    A. Sensor version set to N-1 and Bulk maintenance mode is turned on

    B. Sensor version fixed and Uninstall and maintenance protection turned on

    C. Sensor version updates off and Uninstall and maintenance protection turned off

    D. Sensor version set to N-2 and Bulk maintenance mode is turned on

  • Question 13:

    Which is the correct order for manually installing a Falcon Package on a macOS system?

    A. Install the Falcon package, then register the Falcon Sensor via the registration package

    B. Install the Falcon package, then register the Falcon Sensor via command line

    C. Register the Falcon Sensor via command line, then install the Falcon package

    D. Register the Falcon Sensor via the registration package, then install the Falcon package

  • Question 14:

    When a host belongs to more than one host group, how is sensor update precedence determined?

    A. Groups have no impact on sensor update policies

    B. Sensors of hosts that belong to more than one group must be manually updated

    C. The highest precedence policy from the most important group is applied to the host

    D. All of the host's groups are examined in aggregate and the policy with highest precedence is applied to the host

  • Question 15:

    What type of information is found in the Linux Sensors Dashboard?

    A. Hosts by Kernel Version, Shells spawned by Root, Wget/Curl Usage

    B. Hidden File execution, Execution of file from the trash, Versions Running with Computer Names

    C. Versions running, Directory Made Invisible to Spotlight, Logging/Auditing Referenced, Viewed, or Modified

    D. Private Information Accessed, Archiving Tools ?Exfil, Files Made Executable

  • Question 16:

    Which of the following Machine Learning (ML) sliders will only detect or prevent high confidence malicious items?

    A. Aggressive

    B. Cautious

    C. Minimal

    D. Moderate

  • Question 17:

    In order to quarantine files on the host, what prevention policy settings must be enabled?

    A. Malware Protection and Custom Execution Blocking must be enabled

    B. Next-Gen Antivirus Prevention sliders and "Quarantine and Security Center Registration" must be enabled

    C. Malware Protection and Windows Anti-Malware Execution Blocking must be enabled

    D. Behavior-Based Threat Prevention sliders and Advanced Remediation Actions must be enabled

  • Question 18:

    What command should be run to verify if a Windows sensor is running?

    A. regedit myfile.reg

    B. sc query csagent

    C. netstat -f

    D. ps -ef | grep falcon

  • Question 19:

    Which of the following tools developed by Crowdstrike is intended to help with removal of the CrowdStrike Windows Falcon Sensor?

    A. CrowdStrikeRemovalTool.exe

    B. UninstallTool.exe

    C. CSUninstallTool.exe

    D. FalconUninstall.exe

  • Question 20:

    You have been provided with a list of 100 hashes that are not malicious but your company has deemed to be inappropriate for work computers. They have asked you to ensure that they are not allowed to run in your environment. You have

    chosen to use Falcon to do this.

    Which is the best way to accomplish this?

    A. Using the Support Portal, create a support ticket and include the list of binary hashes, asking support to create an "Execution Prevention" rule to prevent these processes from running

    B. Using Custom Alerts in the Investigate App, create a new alert using the template "Process Execution" and within that rule, select the option to "Block Execution"

    C. Using IOC Management, gather the list of SHA256 or MD5 hashes for each binary and then upload them. Set all hashes to "Block" and ensure that the prevention policy these computers are using includes the option for "Custom Blocking" under Execution Blocking.

    D. Using the API, gather the list of SHA256 or MD5 hashes for each binary and then upload them, setting them all to "Never Allow"

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CrowdStrike exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCFA-200 exam preparations and CrowdStrike certification application, do not hesitate to visit our Vcedump.com to find your solutions here.