Exam Details

  • Exam Code
    :CCFA-200
  • Exam Name
    :CrowdStrike Certified Falcon Administrator
  • Certification
    :CrowdStrike Certifications
  • Vendor
    :CrowdStrike
  • Total Questions
    :186 Q&As
  • Last Updated
    :Mar 23, 2025

CrowdStrike CrowdStrike Certifications CCFA-200 Questions & Answers

  • Question 41:

    The Falcon sensor uses certificate pinning to defend against man-in-the-middle attacks. Which statement is TRUE concerning Falcon sensor certificate validation?

    A. SSL inspection should be configured to occur on all Falcon traffic

    B. Some network configurations, such as deep packet inspection, interfere with certificate validation

    C. HTTPS interception should be enabled to proceed with certificate validation

    D. Common sources of interference with certificate pinning include protocol race conditions and resource contention

  • Question 42:

    How can you find a list of hosts that have not communicated with the CrowdStrike Cloud in the last 30 days?

    A. Under Dashboards and reports, choose the Sensor Report. Set the "Last Seen" dropdown to 30 days and reference the Inactive Sensors widget

    B. Under Host setup and management, choose the Host Management page. Set the group filter to "Inactive Sensors"

    C. Under Host setup and management > Managed endpoints > Inactive Sensors. Change the time range to 30 days

    D. Under Host setup and management, choose the Disabled Sensors Report. Change the time range to 30 days

  • Question 43:

    What best describes what happens to detections in the console after clicking "Disable Detections" for a host from within the Host Management page?

    A. The detections for the host are removed from the console immediately and no new detections will display in the console going forward

    B. You cannot disable detections for a host

    C. Existing detections for the host remain, but no new detections will display in the console going forward

    D. Preventions will be disabled for the host

  • Question 44:

    Which of the following is an effective Custom IOA rule pattern to kill any process attempting to access www.badguydomain.com?

    A. .*badguydomain.com.*

    B. \Device\HarddiskVolume2\*.exe -SingleArgument www.badguydomain.com /kill

    C. badguydomain\.com.*

    D. Custom IOA rules cannot be created for domains

  • Question 45:

    Even though you are a Falcon Administrator, you discover you are unable to use the "Connect to Host" feature to gather additional information which is only available on the host. Which role do you need added to your user account to have this capability?

    A. Real Time Responder

    B. Endpoint Manager

    C. Falcon Investigator

    D. Remediation Manager

  • Question 46:

    On the Host management page which filter could be used to quickly identify all devices categorized as a "Workstation" by the Falcon Platform?

    A. Status

    B. Platform

    C. Hostname

    D. Type

  • Question 47:

    You are beginning the rollout of the Falcon Sensor for the first time side-by-side with your existing security solution. You need to configure the Machine Learning levels of the Prevention Policy so it does not interfere with existing solutions

    during the testing phase.

    What settings do you choose?

    A. Detection slider: Extra Aggressive Prevention slider: Cautious

    B. Detection slider: Moderate Prevention slider: Disabled

    C. Detection slider: Cautious Prevention slider: Cautious

    D. Detection slider: Disabled Prevention slider: Disabled

  • Question 48:

    An administrator creating an exclusion is limited to applying a rule to how many groups of hosts?

    A. File exclusions are not aligned to groups or hosts

    B. There is a limit of three groups of hosts applied to any exclusion

    C. There is no limit and exclusions can be applied to any or all groups

    D. Each exclusion can be aligned to only one group of hosts

  • Question 49:

    Which of the following uses Regex to create a detection or take a preventative action?

    A. Custom IOC

    B. Machine Learning Exclusion

    C. Custom IOA D. Sensor Visibility Exclusion

  • Question 50:

    How do you assign a Prevention policy to one or more hosts?

    A. Create a new policy and assign it directly to those hosts on the Host Management page

    B. Modify the users roles on the User Management page

    C. Ensure the hosts are in a group and assign that group to a custom Prevention policy

    D. Create a new policy and assign it directly to those hosts on the Prevention policy page

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CrowdStrike exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CCFA-200 exam preparations and CrowdStrike certification application, do not hesitate to visit our Vcedump.com to find your solutions here.