Where can you find hosts that are in Reduced Functionality Mode?
Options:
A.
Event Search
B.
Executive Summary dashboard
C.
Host Search
D.
Installation Tokens
Answer:
C
Explanation:
Explanation:
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, Reduced Functionality Mode (RFM) is a state where a host’s sensor has limited functionality due to various reasons, such as license expiration, network issues, tampering attempts, etc1. You can find hosts that are in RFM by using the Host Search tool and filtering by Sensor Status = RFM1. You can also view details about why a host is in RFM by clicking on its hostname1.
Question 13
Which option indicates a hash is allowlisted?
Options:
A.
No Action
B.
Allow
C.
Ignore
D.
Always Block
Answer:
B
Explanation:
Explanation:
According to the CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, the allowlist feature allows you to exclude files or directories from being scanned or blocked by CrowdStrike’s machine learning engine or indicators of attack (IOAs)2. This can reduce false positives and improve performance2. When you allowlist a hash, you are allowing that file to execute on any host that belongs to your organization’s CID (customer ID)2. The option to indicate that a hash is allowlisted is "Allow"2.
Question 14
What are Event Actions?
Options:
A.
Automated searches that can be used to pivot between related events and searches
B.
Pivotable hyperlinks available in a Host Search
C.
Custom event data queries bookmarked by the currently signed in Falcon user
D.
Raw Falcon event data
Answer:
A
Explanation:
Explanation:
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, Event Actions are automated searches that can be used to pivot between related events and searches1. They are available in various tools, such as Event Search, Process Timeline, Host Timeline, etc1. You can select one or more events and perform various actions, such as show a process timeline, show a host timeline, show associated event data, show a +/- 10-minute window of events, etc1. These actions can help you investigate and analyze events more efficiently and effectively1.
Question 15
You can jump to a Process Timeline from many views, like a Hash Search, by clicking which of the following?
Options:
A.
ProcessTimeline Link
B.
PID
C.
UTCtime
D.
Process ID or Parent Process ID
Answer:
D
Explanation:
Explanation:
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Process Timeline tool allows you to view all cloudable events associated with a given process, such as process creation, network connections, file writes, registry modifications, etc1. The tool requires two parameters: aid (agent ID) and TargetProcessId_decimal (the decimal value of the process ID)1. You can jump to a Process Timeline from many views, such as Hash Search, Host Timeline, Event Search, etc., by clicking on either the Process ID or Parent Process ID fields in those views1. This will automatically populate the aid and TargetProcessId_decimal parameters for the Process Timeline tool1.