Free CCFA-200 Exam Braindumps (page: 2)

Page 1 of 39

What is the function of a single asterisk (*) in an ML exclusion pattern?

  1. The single asterisk will match any number of characters, including none. It does include separator characters, such as \ or /, which separate portions of a file path
  2. The single asterisk will match any number of characters, including none. It does not include separator characters, such as \ or /, which separate portions of a file path
  3. The single asterisk is the insertion point for the variable list that follows the path
  4. The single asterisk is only used to start an expression, and it represents the drive letter

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/azure/machine-learning The asterisk is a wildcard character that can be used in exclusion patterns to match any number of characters. However, it does not match separator characters, such as \ or /, which are used to separate portions of a file path. For example, the pattern C:\Windows\*\*.exe will match any executable file in any subfolder of the Windows folder, but not in the Windows folder itself.

Falcon Administrator Learning Path | Infographic | CrowdStrike



You have determined that you have numerous Machine Learning detections in your environment that are false positives. They are caused by a single binary that was custom written by a vendor for you and that binary is running on many endpoints.
What is the best way to prevent these in the future?

  1. Contact support and request that they modify the Machine Learning settings to no longer include this detection
  2. Using IOC Management, add the hash of the binary in question and set the action to "Allow"
  3. Using IOC Management, add the hash of the binary in question and set the action to "Block, hide detection"
  4. Using IOC Management, add the hash of the binary in question and set the action to "No Action"

Answer(s): B

Explanation:

to match any number of characters including none while not matching beyond path separators (\ or /) and double asterisks are used to recursively match zero or more directories that fall under the current directory.



What is the purpose of a containment policy?

  1. To define which Falcon analysts can contain endpoints
  2. To define the duration of Network Containment
  3. To define the trigger under which a machine is put in Network Containment (e.g. a critical detection)
  4. To define allowed IP addresses over which your hosts will communicate when contained

Answer(s): D

Explanation:

In the Containment Policy page have the title "Network traffic allowlist" and it only allows to add IPs or CIDR networks to exclude in the moment of the isolation of any host, because it is a global policy, not allowing make distinctions between machines.



An administrator creating an exclusion is limited to applying a rule to how many groups of hosts?

  1. File exclusions are not aligned to groups or hosts
  2. There is a limit of three groups of hosts applied to any exclusion
  3. There is no limit and exclusions can be applied to any or all groups
  4. Each exclusion can be aligned to only one group of hosts

Answer(s): C

Explanation:

An exclusion is a rule that tells the Falcon platform to ignore certain files, folders, processes, or registry keys when performing prevention or detection actions. An administrator can create an exclusion and apply it to one or more groups of hosts, or to all hosts in the organization. For example, an administrator can create an exclusion for a legitimate application that is causing false positives and apply it to the group of hosts that are running that application.


Reference:

Falcon Administrator Learning Path | Infographic | CrowdStrike






Post your Comments and Discuss CrowdStrike CCFA-200 exam with other Community members:

CCFA-200 Discussions & Posts