Aside from a Process Timeline or Event Search, how do you export process event data from a detection in .CSV format?
A. You can't export detailed event data from a detection, you have to use the Process Timeline or an Event Search
B. In Full Detection Details, you expand the nodes of the process tree you wish to expand and then click the "Export Process Events" button
C. In Full Detection Details, you choose the "View Process Activity" option and then export from that view
D. From the Detections Dashboard, you right-click the event type you wish to export and choose CSV. JSON or XML
When looking at the details of a detection, there are two fields called Global Prevalence and Local Prevalence. Which answer best defines Local Prevalence?
A. Local prevalence is the frequency with which the hash of the triggering file is seen across the entire Internet
B. Local Prevalence tells you how common the hash of the triggering file is within your environment (CID)
C. Local Prevalence is the Virus Total score for the hash of the triggering file
D. Local prevalence is the frequency with which the hash of the triggering file is seen across all CrowdStrike customer environments
What is an advantage of using a Process Timeline?
A. Process related events can be filtered to display specific event types
B. Suspicious processes are color-coded based on their frequency and legitimacy over time
C. Processes responsible for spikes in CPU performance are displayed overtime
D. A visual representation of Parent-Child and Sibling process relationships is provided
You found a list of SHA256 hashes in an intelligence report and search for them using the Hash Execution Search. What can be determined from the results?
A. Identifies a detailed list of all process executions for the specified hashes
B. Identifies hosts that loaded or executed the specified hashes
C. Identifies users associated with the specified hashes
D. Identifies detections related to the specified hashes
From a detection, what is the fastest way to see children and sibling process information?
A. Select the Event Search option. Then from the Event Actions, select Show Associated Event Data (From TargetProcessld_decimal)
B. Select Full Detection Details from the detection
C. Right-click the process and select "Follow Process Chain"
D. Select the Process Timeline feature, enter the AID. Target Process ID, and Parent Process ID
Where can you find hosts that are in Reduced Functionality Mode?
A. Event Search
B. Executive Summary dashboard
C. Host Search
D. Installation Tokens
The primary purpose for running a Hash Search is to:
A. determine any network connections
B. review the processes involved with a detection
C. determine the origin of the detection
D. review information surrounding a hash's related activity
After running an Event Search, you can select many Event Actions depending on your results. Which of the following is NOT an option for any Event Action?
A. Draw Process Explorer
B. Show a +/- 10-minute window of events
C. Show a Process Timeline for the responsible process
D. Show Associated Event Data (from TargetProcessld_decimal or ContextProcessld_decimal)
What happens when a hash is allowlisted?
A. Execution is prevented, but detection alerts are suppressed
B. Execution is allowed on all hosts, including all other Falcon customers
C. The hash is submitted for approval to be allowed to execute once confirmed by Falcon specialists
D. Execution is allowed on all hosts that fall under the organization's CID
How long does detection data remain in the CrowdStrike Cloud before purging begins?
A. 90 Days
B. 45 Days
C. 30 Days
D. 14 Days