Free CCFR-201 Sample Questions — CrowdStrike Certified Falcon Responder

Free CCFR-201 sample questions for the CrowdStrike Certified Falcon Responder exam. No account required: study at your own pace.

Want an interactive quiz? Take the full CCFR-201 practice test

Looking for more? Click here to get the full PDF with 59+ practice questions for $10 for offline study and deeper preparation.

Question 1

In the "Full Detection Details", which view will provide an exportable text listing of events like DNS requests. Registry Operations, and Network Operations?

  • A. The data is unable to be exported
  • B. View as Process Tree
  • C. View as Process Timeline
  • D. View as Process Activity
Show Answer
Correct Answer:
D. View as Process Activity
Question 2

In the Hash Search tool, which of the following is listed under Process Executions?

  • A. Operating System
  • B. File Signature
  • C. Command Line
  • D. Sensor Version
Show Answer
Correct Answer:
C. Command Line
Question 3

What information is contained within a Process Timeline?

  • A. All cloudable process-related events within a given timeframe
  • B. All cloudable events for a specific host
  • C. Only detection process-related events within a given timeframe
  • D. view of activities on Mac or Linux hosts
Show Answer
Correct Answer:
A. All cloudable process-related events within a given timeframe
Question 4

What is an advantage of using a Process Timeline?

  • A. Process related events can be filtered to display specific event types
  • B. Suspicious processes are color-coded based on their frequency and legitimacy over time
  • C. Processes responsible for spikes in CPU performance are displayed over time
  • D. visual representation of Parent-Child and Sibling process relationships is provided
Show Answer
Correct Answer:
A. Process related events can be filtered to display specific event types
Question 5

What are Event Actions?

  • A. Automated searches that can be used to pivot between related events and searches
  • B. Pivotable hyperlinks available in a Host Search
  • C. Custom event data queries bookmarked by the currently signed in Falcon user
  • D. Raw Falcon event data
Show Answer
Correct Answer:
A. Automated searches that can be used to pivot between related events and searches
Question 6

What information does the MITRE ATT&CK Framework provide?

  • A. It provides best practices for different cybersecurity domains, such as Identify and Access Management
  • B. It provides a step-by-step cyber incident response strategy
  • C. It provides the phases of an adversary's lifecycle, the platforms they are known to attack, and the specific methods they use
  • D. It is a system that attributes attack techniques to a specific threat actor
Show Answer
Correct Answer:
C. It provides the phases of an adversary's lifecycle, the platforms they are known to attack, and the specific methods they use
Question 7

What happens when a quarantined file is released?

  • A. It is moved into the C:\CrowdStrike\Quarantine\Released folder on the host
  • B. It is allowed to execute on the host
  • C. It is deleted
  • D. It is allowed to execute on all hosts
Show Answer
Correct Answer:
B. It is allowed to execute on the host
Question 8

What do IOA exclusions help you achieve?

  • A. Reduce false positives based on Next-Gen Antivirus settings in the Prevention Policy
  • B. Reduce false positives of behavioral detections from IOA based detections only
  • C. Reduce false positives of behavioral detections from IOA based detections based on a file hash
  • D. Reduce false positives of behavioral detections from Custom IOA and OverWatch detections only
Show Answer
Correct Answer:
B. Reduce false positives of behavioral detections from IOA based detections only
Question 9

From a detection, what is the fastest way to see children and sibling process information?

  • A. Select the Event Search option. Then from the Event Actions, select Show Associated Event Data (From TargetProcessId_decimal)
  • B. Select Full Detection Details from the detection
  • C. Right-click the process and select "Follow Process Chain"
  • D. Select the Process Timeline feature, enter the AID, Target Process ID, and Parent Process ID
Show Answer
Correct Answer:
B. Select Full Detection Details from the detection
Question 10

The function of Machine Learning Exclusions is to _____________.

  • A. stop all detections for a specific pattern ID
  • B. stop all sensor data collection for the matching path(s)
  • C. stop all Machine Learning Preventions but a detection will still be generated and files will still be uploaded to the CrowdStrike Cloud
  • D. stop all ML-based detections and preventions for the matching path(s) and/or stop files from being uploaded to the CrowdStrike Cloud
Show Answer
Correct Answer:
D. stop all ML-based detections and preventions for the matching path(s) and/or stop files from being uploaded to the CrowdStrike Cloud
Question 11

The primary purpose for running a Hash Search is to:

  • A. determine any network connections
  • B. review the processes involved with a detection
  • C. determine the origin of the detection
  • D. review information surrounding a hash's related activity
Show Answer
Correct Answer:
D. review information surrounding a hash's related activity
Question 12

What action is used when you want to save a prevention hash for later use?

  • A. Always Block
  • B. Never Block
  • C. Always Allow
  • D. No Action
Show Answer
Correct Answer:
D. No Action
Question 13

From the Detections page, how can you view 'in-progress' detections assigned to Falcon Analyst Alex?

  • A. Filter on 'Analyst: Alex'
  • B. Alex does not have the correct role permissions as a Falcon Analyst to be assigned detections
  • C. Filter on 'Hostname: Alex' and 'Status: In-Progress'
  • D. Filter on 'Status: In-Progress' and 'Assigned-to: Alex'
Show Answer
Correct Answer:
D. Filter on 'Status: In-Progress' and 'Assigned-to: Alex'
Question 14

Which of the following is returned from the IP Search tool?

  • A. IP Summary information from Falcon events containing the given IP
  • B. Threat Graph Data for the given IP from Falcon sensors
  • C. Unmanaged host data from system ARP tables for the given IP
  • D. IP Detection Summary information for detection events containing the given IP
Show Answer
Correct Answer:
A. IP Summary information from Falcon events containing the given IP
Question 15

Which of the following is an example of a MITRE ATT&CK tactic?

  • A. Eternal Blue
  • B. Defense Evasion
  • C. Emotet
  • D. Phishing
Show Answer
Correct Answer:
B. Defense Evasion

Aced these? Get the Full Exam

Download the complete CCFR-201 study bundle with 59+ questions in a single printable PDF.