Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What Search page would help a threat hunter differentiate testing, DevOPs, or general user activity from adversary behavior?

A.

Hash Search

B.

IP Search

C.

Domain Search

D.

User Search

Which of the following is TRUE about a Hash Search?

A.

Wildcard searches are not permitted with the Hash Search

B.

The Hash Search provides Process Execution History

C.

The Hash Search is available on Linux

D.

Module Load History is not presented in a Hash Search

To view Files Written to Removable Media within a specified timeframe on a host within the Host Search page, expand and refer to the _______dashboard panel.

A.

Command Line and Admin Tools

B.

Processes and Services

C.

Registry, Tasks, and Firewall

D.

Suspicious File Activity

Which of the following Event Search queries would only find the DNS lookups to the domain: www randomdomain com?

A.

event_simpleName=DnsRequest DomainName=www randomdomain com

B.

event_simpleName=DnsRequest DomainName=randomdomain com ComputerName=localhost

C.

Dns=randomdomain com

D.

ComputerName=localhost DnsRequest "randomdomain com"

What do you click to jump to a Process Timeline from many pages in Falcon, such as a Hash Search?

A.

PID

B.

Process ID or Parent Process ID

C.

CID

D.

Process Timeline Link

What elements are required to properly execute a Process Timeline?

A.

Agent ID (AID) and Target Process ID

B.

Agent ID (AID) only

C.

Hostname and Local Process ID

D.

Target Process ID only

What type of attack would this process tree indicate?

A.

Brute Forcing Attack

B.

Man-in-the-middle Attack

C.

Phishing Attack

D.

Web Application Attack

You are reviewing a list of domains recently banned by your organization's acceptable use policy. In particular, you are looking for the number of hosts that have visited each domain. Which tool should you use in Falcon?

A.

Create a custom alert for each domain

B.

Allowed Domain Summary Report

C.

Bulk Domain Search

D.

IP Addresses Search

Which pre-defined reports offer information surrounding activities that typically indicate suspicious activity occurring on a system?

A.

Scheduled searches

B.

Hunt reports

C.

Sensor reports

D.

Timeline reports

The Process Timeline Events Details table will populate the Parent Process ID and the Parent File columns when the cloudable Event data contains which event field?

A.

ContextProcessld_decimal

B.

RawProcessld_decimal

C.

ParentProcessld_decimal

D.

RpcProcessld_decimal