Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 18 questions
Exam Code: CCFH-202                Update: Jul 8, 2025
Exam Name: CrowdStrike Certified Falcon Hunter

CrowdStrike CrowdStrike Certified Falcon Hunter CCFH-202 Exam Dumps: Updated Questions & Answers (July 2025)

Question # 1

Event Search data is recorded with which time zone?

A.

PST

B.

GMT

C.

EST

D.

UTC

Question # 2

You would like to search for ANY process execution that used a file stored in the Recycle Bin on a Windows host. Select the option to complete the following EAM query.

A.

*$Recycle Bin^

B.

*$Recycle Bin*

C.

^$Recycle Bin*

D.

^$Recycle.Bin%^

Question # 3

Which field should you reference in order to find the system time of a *FileWritten event?

A.

ContextTimeStamp_decimal

B.

FileTimeStamp_decimal

C.

ProcessStartTime_decimal

D.

timestamp

Question # 4

Which of the following would be the correct field name to find the name of an event?

A.

Event_SimpleName

B.

Event_Simple_Name

C.

EVENT_SIMPLE_NAME

D.

event_simpleName

Question # 5

When performing a raw event search via the Events search page, what are Event Actions?

A.

Event Actions contains an audit information log of actions an analyst took in regards to a specific detection

B.

Event Actions contains the summary of actions taken by the Falcon sensor such as quarantining a file, prevent a process from executing or taking no actions and creating a detection only

C.

Event Actions are pivotable workflows including connecting to a host, pre-made event searches and pivots to other investigatory pages such as host search

D.

Event Actions is the field name that contains the event name defined in the Events Data Dictionary such as ProcessRollup, SyntheticProcessRollup, DNS request, etc

Question # 6

To view Files Written to Removable Media within a specified timeframe on a host within the Host Search page, expand and refer to the _______dashboard panel.

A.

Command Line and Admin Tools

B.

Processes and Services

C.

Registry, Tasks, and Firewall

D.

Suspicious File Activity

Question # 7

Which of the following is an example of a Falcon threat hunting lead?

A.

A routine threat hunt query showing process executions of single letter filename (e.g., a.exe) from temporary directories

B.

Security appliance logs showing potentially bad traffic to an unknown external IP address

C.

A help desk ticket for a user clicking on a link in an email causing their machine to become unresponsive and have high CPU usage

D.

An external report describing a unique 5 character file extension for ransomware encrypted files

Question # 8

Which field in a DNS Request event points to the responsible process?

A.

ContextProcessld_readable

B.

TargetProcessld_decimal

C.

ContextProcessld_decimal

D.

ParentProcessId_decimal

Question # 9

Which threat framework allows a threat hunter to explore and model specific adversary tactics and techniques, with links to intelligence and case studies?

A.

MITRE ATT&CK

B.

Lockheed Martin Cyber Kill Chain

C.

Director of National Intelligence Cyber Threat Framework

D.

NIST 800-171 Cyber Threat Framework

Question # 10

What information is provided when using IP Search to look up an IP address?

A.

Both internal and external IPs

B.

Suspicious IP addresses

C.

External IPs only

D.

Internal IPs only

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Jul 2025