Free CCFA-200 Exam Braindumps (page: 5)

Page 4 of 39

Which role is required to manage groups and policies in Falcon?

  1. Falcon Host Analyst
  2. Falcon Host Administrator
  3. Prevention Hashes Manager
  4. Falcon Host Security Lead

Answer(s): B

Explanation:

The Falcon Host Administrator role is required to manage groups and policies in Falcon. This role allows users to create, edit and delete groups and policies, as well as assign them to hosts. The other roles do not have this capability.


Reference:

[CrowdStrike Falcon User Guide], page 17.



Which of the following can a Falcon Administrator edit in an existing user's profile?

  1. First or Last name
  2. Phone number
  3. Email address
  4. Working groups

Answer(s): A

Explanation:

Roles are never called 'working groups' in the documentation. The only other option that can be edited on a existing user is first and last name.



You want the Falcon Cloud to push out sensor version changes but you also want to manually control when the sensor version is upgraded or downgraded. In the Sensor Update policy, which is the best Sensor version option to achieve these requirements?

  1. Specific sensor version number
  2. Auto - TEST-QA
  3. Sensor version updates off
  4. Auto - N-1

Answer(s): A

Explanation:

The administrator can choose a specific sensor version number in the Sensor Update policy to manually control when the sensor version is upgraded or downgraded. This will allow the Falcon Cloud to push out sensor version changes, but only when the administrator changes the version number in the policy. The other options will either automate the sensor version updates or turn them off completely.


Reference:

[CrowdStrike Falcon User Guide], page 38.



What is the goal of a Network Containment Policy?

  1. Increase the aggressiveness of the assigned prevention policy
  2. Limit the impact of a compromised host on the network
  3. Gain more visibility into network activities
  4. Partition a network for privacy

Answer(s): B

Explanation:

The goal of a Network Containment Policy is to limit the impact of a compromised host on the network. This policy allows users to isolate a host from the network, while still allowing it to communicate with the Falcon Cloud and other essential services. This can help prevent further damage or data exfiltration from a compromised host. The other options are either incorrect or not related to the policy.


Reference:

[CrowdStrike Falcon User Guide], page 40.






Post your Comments and Discuss CrowdStrike CCFA-200 exam with other Community members:

CCFA-200 Discussions & Posts