Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CCFA-200 CrowdStrike Certified Falcon Administrator Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CrowdStrike CCFA-200 CrowdStrike Certified Falcon Administrator certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 3
Total 153 questions

Which role allows a user to connect to hosts using Real-Time Response?

A.

Endpoint Manager

B.

Falcon Administrator

C.

Real Time Responder – Active Responder

D.

Prevention Hashes Manager

Which is a filter within the Host setup and management > Host management page?

A.

User name

B.

OU

C.

BIOS Version

D.

Locality

What should be disabled on firewalls so that the sensor's man-in-the-middle attack protection works properly?

A.

Deep packet inspection

B.

Linux Sub-System

C.

PowerShell

D.

Windows Proxy

Which of the following roles allows a Falcon user to create Real Time Response Custom Scripts?

A.

Real Time Responder – Administrator

B.

Real Time Responder – Read Only Analyst

C.

Real Time Responder – Script Developer

D.

Real Time Responder – Active Responder

What is the primary purpose of using glob syntax in an exclusion?

A.

To specify a Domain be excluded from detections

B.

To specify exclusion patterns to easily exclude files and folders and extensions from detections

C.

To specify exclusion patterns to easily add files and folders and extensions to be prevented

D.

To specify a network share be excluded from detections

How do you disable all detections for a host?

A.

Create an exclusion rule and apply it to the machine or group of machines

B.

Contact support and provide them with the Agent ID (AID) for the machine and they will put it on the Disabled Hosts list in your Customer ID (CID)

C.

You cannot disable all detections on individual hosts as it would put them at risk

D.

In Host Management, select the host and then choose the option to Disable Detections

How are user permissions set in Falcon?

A.

Permissions are assigned to a User Group and then users are assigned to that group, thereby inheriting those permissions

B.

Pre-defined permissions are assigned to sets called roles. Users can be assigned multiple roles based on job function and they assume a cumulative set of permissions based on those assignments

C.

An administrator selects individual granular permissions from the Falcon Permissions List during user creation

D.

Permissions are token-based. Users request access to a defined set of permissions and an administrator adds their token to the set of permissions

Where can you modify settings to permit certain traffic during a containment period?

A.

Prevention Policy

B.

Host Settings

C.

Containment Policy

D.

Firewall Settings

An inactive host that does not contact the Falcon cloud will be automatically removed from the Host Management and Trash pages after how many days?

A.

45 Days

B.

60 Days

C.

75 Days

D.

90 Days

Which report lists counts of sensors in Reduced Functionality Mode (RFM) for all operating system types, and tracks how long a sensor version will be supported?

A.

Reduce Functionality Audit Report

B.

Sensor Health Report

C.

Sensor Coverage Lookup

D.

Inactive Sensor Report

You have a new patch server that should be reachable while hosts in your environment are network contained. The server's IP address is static and does not change. Which of the following is the best approach to updating the Containment Policy to allow this?

A.

Add an allowlist entry for the individual server's MAC address

B.

Add an allowlist entry containing the host group that the server belongs to

C.

Add an allowlist entry for the individual server's IP address

D.

Add an allowlist entry containing CIDR notation for the /24 network the server belongs to

How can you find a list of hosts that have not communicated with the CrowdStrike Cloud in the last 30 days?

A.

Under Dashboards and reports, choose the Sensor Report. Set the "Last Seen" dropdown to 30 days and reference the Inactive Sensors widget

B.

Under Host setup and management, choose the Host Management page. Set the group filter to "Inactive Sensors"

C.

Under Host setup and management > Managed endpoints > Inactive Sensors. Change the time range to 30 days

D.

Under Host setup and management, choose the Disabled Sensors Report. Change the time range to 30 days

Which of the following is NOT an available action for an API Client?

A.

Edit an API Client

B.

Reset an API Client Secret

C.

Retrieve an API Client Secret

D.

Delete an API Client

Which of the following is NOT a way to determine the sensor version installed on a specific endpoint?

A.

Use the Sensor Report to filter to the specific endpoint

B.

Use the Investigate > Host Search to filter to the specific endpoint

C.

Use Host Management to select the desired endpoint. The agent version will be listed in the columns and details

D.

From a command line, run the sc query csagent -version command

What is the purpose of the Machine-Learning Prevention Monitoring Report?

A.

It is designed to give an administrator a quick overview of machine-learning aggressiveness settings as well as the numbers of items actually quarantined

B.

It is the dashboard used by an analyst to view all items quarantined and to release any items deemed non-malicious

C.

It is the dashboard used to see machine-learning preventions, and it is used to identify spikes in activity and possible targeted attacks

D.

It is designed to show malware that would have been blocked in your environment based on different Machine-Learning Prevention settings

Which of the following best describes what the Uninstall and Maintenance Protection setting controls within your Sensor Update Policy?

A.

Prevents automatic updates of the sensor

B.

Prevents the sensor from entering Reduced Functionality Mode

C.

Prevents modification of sensor update policy

D.

Prevents unauthorized uninstallation of the sensor

How do you find a list of inactive sensors?

A.

The Falcon platform does not provide reporting for inactive sensors

B.

A sensor is always considered active until removed by an Administrator

C.

Run the Inactive Sensor Report in the Host setup and management option

D.

Run the Sensor Aging Report within the Investigate option

How many "Auto" sensor version update options are available for Windows Sensor Update Policies?

A.

1

B.

2

C.

0

D.

3

Which of the following is TRUE regarding disabling detections for a host?

A.

After disabling detections, the host will operate in Reduced Functionality Mode (RFM) until detections are enabled

B.

After disabling detections, the data for all existing detections prior to disabling detections is removed from the Event Search

C.

The DetectionSummaryEvent continues being sent to the Streaming API for that host

D.

The detections for that host are removed from the console immediately. No new detections will display in the console going forward unless detections are enabled

Which of the following can a Falcon Administrator edit in an existing user's profile?

A.

First or Last name

B.

Phone number

C.

Email address

D.

Working groups

Page: 1 / 3
Total 153 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved