Free CCFH-202 Exam Braindumps (page: 8)

Page 7 of 23

Which of the following is the proper method to quantify search results, enabling a hunter to quickly sort and identify outliers?

  1. Using the “| stats count by” command at the end of a search string in Event Search
  2. Using the “|stats count” command at the end of a search string in Event Search
  3. Using the “|eval” command at the end of a search string in Event Search
  4. Exporting Event Search results to a spreadsheet and aggregating the results

Answer(s): A



What type of attack would this process tree indicate?

  1. Brute Forcing Attack
  2. Man-in-the-middle Attack
  3. Phishing Attack
  4. Web Application Attack

Answer(s): C



Which pre-defined reports offer information surrounding activities that typically indicate suspicious activity occurring on a system?

  1. Scheduled searches
  2. Hunt reports
  3. Sensor reports
  4. Timeline reports

Answer(s): B



Lateral movement through a victim environment is an example of which stage of the Cyber Kill Chain?

  1. Command & Control
  2. Actions on Objectives
  3. Exploitation
  4. Delivery

Answer(s): A






Post your Comments and Discuss CrowdStrike CCFH-202 exam with other Community members:

CCFH-202 Discussions & Posts