When examining raw event data, what is the purpose of the field called ParentProcessld_decimal?
A. It contains an internal value not useful for an investigation
B. It contains the TargetProcessld_decimal value of the child process
C. It contains the Sensorld_decimal value for related events
D. It contains the TargetProcessld_decimal of the parent process
What information does the MITRE ATTandCKFramework provide?
A. It provides best practices for different cybersecurity domains, such as Identify and Access Management
B. It provides a step-by-step cyber incident response strategy
C. It provides the phases of an adversary's lifecycle, the platforms they are known to attack, and the specific methods they use
D. It is a system that attributes an attack techniques to a specific threat actor
You are notified by a third-party that a program may have redirected traffic to a malicious domain. Which Falcon page will assist you in searching for any domain request information related to this notice?
A. Falcon X
B. Investigate
C. Discover
D. Spotlight
Aside from a Process Timeline or Event Search, how do you export process event data from a detection in .CSV format?
A. You can't export detailed event data from a detection, you have to use the Process Timeline or an Event Search
B. In Full Detection Details, you expand the nodes of the process tree you wish to expand and then click the "Export Process Events" button
C. In Full Detection Details, you choose the "View Process Activity" option and then export from that view
D. From the Detections Dashboard, you right-click the event type you wish to export and choose CSV. JSON or XML
The function of Machine Learning Exclusions is to___________.
A. stop all detections for a specific pattern ID
B. stop all sensor data collection for the matching path(s)
C. Stop all Machine Learning Preventions but a detection will still be generated and files will still be uploaded to the CrowdStrike Cloud
D. stop all ML-based detections and preventions for the matching path(s) and/or stop files from being uploaded to the CrowdStrike Cloud
What happens when you create a Sensor Visibility Exclusion for a trusted file path?
A. It excludes host information from Detections and Incidents generated within that file path location
B. It prevents file uploads to the CrowdStrike cloud from that file path
C. It excludes sensor monitoring and event collection for the trusted file path
D. It disables detection generation from that path, however the sensor can still perform prevention actions
Which is TRUE regarding a file released from quarantine?
A. No executions are allowed for 14 days after release
B. It is allowed to execute on all hosts
C. It is deleted
D. It will not generate future machine learning detections on the associated host
What is an advantage of using a Process Timeline?
A. Process related events can be filtered to display specific event types
B. Suspicious processes are color-coded based on their frequency and legitimacy over time
C. Processes responsible for spikes in CPU performance are displayed overtime
D. A visual representation of Parent-Child and Sibling process relationships is provided
A list of managed and unmanaged neighbors for an endpoint can be found:
A. by using Hosts page in the Investigate tool
B. by reviewing "Groups" in Host Management under the Hosts page
C. under "Audit" by running Sensor Visibility Exclusions Audit
D. only by searching event data using Event Search
When analyzing an executable with a global prevalence of common; but you do not know what the executable is. what is the best course of action?
A. Do nothing, as this file is common and well known
B. From detection, click the VT Hash button to pivot to VirusTotal to investigate further
C. From detection, use API manager to create a custom blocklist
D. From detection, submit to FalconX for deep dive analysis