CFA Flashcards
What is the purpose of a containment policy?
A. To define which Falcon analysts can contain endpoints
B. To define the duration of Network Containment
C. To define the trigger under which a machine is put in Network Containment (e.g. a critical detection)
D. To define allowed IP addresses over which your hosts will communicate when contained
D. To define allowed IP addresses over which your hosts will communicate when contained
Your organization has a set of servers that are not allowed to be accessed remotely, including via Real Time Response (RTR). You already have these servers in their own Falcon host group. What is the next step to disable RTR only on these hosts?
A. Edit the Default Response Policy, toggle the “Real Time Response” switch off and assign the policy to the host group
B. Edit the Default Response Policy and add the host group to the exceptions list under “Real Time Functionality”
C. Create a new Response Policy, toggle the “Real Time Response” switch off and assign the policy to the host group
D. Create a new Response Policy and add the host name to the exceptions list under “Real Time Functionality”
C. Create a new Response Policy, toggle the “Real Time Response” switch off and assign the policy to the host group
When creating new IOCs in IOC management, which of the following fields must be configured?
A. Hash, Description, Filename
B. Hash, Action and Expiry Date
C. Filename, Severity and Expiry Date
D. Hash, Platform and Action
D. Hash, Platform and Action
You want the Falcon Cloud to push out sensor version changes but you also want to manually control when the sensor version is upgraded or downgraded. In the Sensor Update policy, which is the best Sensor version option to achieve these requirements?
A. Specific sensor version number
B. Auto - TEST-QA
C. Sensor version updates off
D. Auto - N-1
A. Specific sensor version number
Which of the following applies to Custom Blocking Prevention Policy settings?
A. Hashes must be entered on the Prevention Hashes page before they can be blocked via this policy
B. Blocklisting applies to hashes, IP addresses, and domains
C. Executions blocked via hash blocklist may have partially executed prior to hash calculation process remediation may be necessary
D. You can only blocklist hashes via the API
A. Hashes must be entered on the Prevention Hashes page before they can be blocked via this policy
What information is provided in Logon Activities under Visibility Reports?
A. A list of all logons for all users
B. A list of last endpoints that a user logged in to
C. A list of users who are remotely logged on to devices based on local IP and local port
D. A list of unique users who are remotely logged on to devices based on the country
B. A list of last endpoints that a user logged in to
What command should be run to verify if a Windows sensor is running?
A. regedit myfile.reg
B. sc query csagent
C. netstat -f
D. ps -ef | grep falcon
B. sc query csagent
When configuring a specific prevention policy, the admin can align the policy to two different types of groups, Host Groups and which other?
A. Custom IOA Rule Groups
B. Custom IOC Groups
C. Enterprise Groups
D. Operating System Groups
A. Custom IOA Rule Groups
Why is it critical to have separate sensor update policies for Windows/Mac/*nix?
A. There may be special considerations for each OS
B. To assist with testing and tracking sensor rollouts
C. The network protocols are different for each host OS
D. It is an auditing requirement
A. There may be special considerations for each OS
You want to create a detection-only policy. How do you set this up in your policy’s settings?
A. Enable the detection sliders and disable the prevention sliders. Then ensure that Next Gen Antivirus is enabled so it will disable Windows Defender.
B. Select the “Detect-Only” template. Disable hash blocking and exclusions.
C. You can’t create a policy that detects but does not prevent. Use Custom IOA rules to detect.
D. Set the Next-Gen Antivirus detection settings to the desired detection level and all the prevention sliders to disabled. Do not activate any of the other blocking or malware prevention options.
D. Set the Next-Gen Antivirus detection settings to the desired detection level and all the prevention sliders to disabled. Do not activate any of the other blocking or malware prevention options
What are custom alerts based on?
A. Custom workflows
B. Custom event based triggers
C. Predefined alert templates
D. User defined Splunk queries
C. Predefined alert templates
What model is used to create workflows that would allow you to create custom notifications based on particular events which occur in the Falcon platform?
A. For - While statement(s)
B. Trigger, condition(s) and action(s)
C. Event trigger(s)
D. Predefined workflow template(s)
B. Trigger, condition(s) and action(s)
On which page of the Falcon console would you create sensor groups?
A. User management
B. Sensor update policies
C. Host management
D. Host groups
D. Host groups
Which of the following is TRUE regarding Falcon Next-Gen AntiVirus (NGAV)?
A. Falcon NGAV relies on signature-based detections
B. Activating Falcon NGAV will also enable all detection and prevention settings in the entire policy
C. The Detection sliders cannot be set to a value less aggressive than the Prevention sliders
D. Falcon NGAV is not a replacement for Windows Defender or other antivirus programs
C. The Detection sliders cannot be set to a value less aggressive than the Prevention sliders
Which of the following options is a feature found ONLY with the Sensor-based Machine Learning (ML)?
A. Next-Gen Antivirus (NGAV) protection
B. Adware and Potentially Unwanted Program detection and prevention
C. Real-time offline protection
D. Identification and analysis of unknown executables
C. Real-time offline protection
The Logon Activities Report includes all of the following information for a particular user EXCEPT __________.
A. the account type for the user (e.g. Domain Administrator, Local User)
B. all hosts the user logged into
C. the logon type (e.g. interactive, service)
D. the last time the user’s password was set
D. the last time the user’s password was set
How are user permissions set in Falcon?
A. Permissions are assigned to a User Group and then users are assigned to that group, thereby inheriting those permissions
B. Pre-defined permissions are assigned to sets called roles. Users can be assigned multiple roles based on job function and they assume a cumulative set of permissions based on those assignments
C. An administrator selects individual granular permissions from the Falcon Permissions List during user creation
D. Permissions are token-based. Users request access to a defined set of permissions and an administrator adds their token to the set of permissions
B. Pre-defined permissions are assigned to sets called roles. Users can be assigned multiple roles based on job function and they assume a cumulative set of permissions based on those assignments
What is the function of a single asterisk (*) in an ML exclusion pattern?
A. The single asterisk will match any number of characters, including none. It does include separator characters, such as \ or /, which separate portions of a file path
B. The single asterisk will match any number of characters, including none. It does not include separator characters, such as \ or /, which separate portions of a file path
C. The single asterisk is the insertion point for the variable list that follows the path
D. The single asterisk is only used to start an expression, and it represents the drive letter
B. The single asterisk will match any number of characters, including none. It does not include separator characters, such as \ or /, which separate portions of a file path
You have determined that you have numerous Machine Learning detections in your environment that are false positives. They are caused by a single binary that was custom written by a vendor for you and that binary is running on many endpoints. What is the best way to prevent these in the future?
A. Contact support and request that they modify the Machine Learning settings to no longer include this detection
B. Using IOC Management, add the hash of the binary in question and set the action to “Allow”
C. Using IOC Management, add the hash of the binary in question and set the action to “Block, hide detection”
D. Using IOC Management, add the hash of the binary in question and set the action to “No Action”
B. Using IOC Management, add the hash of the binary in question and set the action to “Allow”
An administrator creating an exclusion is limited to applying a rule to how many groups of hosts?
A. File exclusions are not aligned to groups or hosts
B. There is a limit of three groups of hosts applied to any exclusion
C. There is no limit and exclusions can be applied to any or all groups
D. Each exclusion can be aligned to only one group of hosts
C. There is no limit and exclusions can be applied to any or all groups
Even though you are a Falcon Administrator, you discover you are unable to use the “Connect to Host” feature to gather additional information which is only available on the host. Which role do you need added to your user account to have this capability?
A. Real Time Responder
B. Endpoint Manager
C. Falcon Investigator
D. Remediation Manager
A. Real Time Responder
What must an admin do to reset a user’s password?
A. From User Management, open the account details for the affected user and select “Generate New Password”
B. From User Management, select “Reset Password” from the three dot menu for the affected user account
C. From User Management, select “Update Account” and manually create a new password for the affected user account
D. From User Management, the administrator must rebuild the account as the certificate for user specific private/public key generation is no longer valid
B. From User Management, select “Reset Password” from the three dot menu for the affected user account
Your CISO has decided all Falcon Analysts should also have the ability to view files and file contents locally on compromised hosts, but without the ability to take them off the host. What is the most appropriate role that can be added to fullfil this requirement?
A. Remediation Manager
B. Real Time Responder - Read Only Analyst
C. Falcon Analyst - Read Only
D. Real Time Responder - Active Responder
B. Real Time Responder - Read Only Analyst
One of your development teams is working on code for a new enterprise application but Falcon continually flags the execution as a detection during testing. All development work is required to be stored on a file share in a folder called “devcode.” What setting can you use to reduce false positives on this file path?
A. USB Device Policy
B. Firewall Rule Group
C. Containment Policy
D. Machine Learning Exclusions
D. Machine Learning Exclusions