Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free CrowdStrike CCFA-200b Practice Exam with Questions & Answers

Questions 1

Which Windows prevention policy setting monitors contents of shells for execution of malicious content?

Options:
A.

Script-based execution visibility

B.

Suspicious Scripts and Commands

C.

Enhanced exploitation visibility

D.

Additional user mode data visibility

CrowdStrike CCFA-200b Premium Access
Questions 2

Where can you find the history of the successes and failures for any Fusion SOAR workflows?

Options:
A.

Falcon UI Audit Trail

B.

Custom Alert History

C.

Workflow Audit log

D.

Workflow Execution log

Questions 3

What is the fastest way to locate inactive sensors in the Falcon console?

Options:
A.

Sort hosts by Last Seen timestamp

B.

Export all host data to CSV

C.

Filter the Host Management page to show inactive hosts

D.

Search for hosts with no Agent ID

Questions 4

What policy setting should be selected for a new host when it has an existing antivirus?

Options:
A.

Extra Aggressive Level ML

B.

Aggressive Level ML

C.

Moderate Level ML

D.

Cautious Level ML

Questions 5

In order to quarantine files on the host, what prevention policy settings must be enabled?

Options:
A.

Malware Protection and Windows Anti-Malware Execution Blocking

B.

Next-Gen Antivirus Prevention sliders and “Quarantine & Security Center Registration”

C.

Malware Protection and Custom Execution Blocking

D.

Behavior-Based Threat Prevention sliders and Advanced Remediation Actions

Questions 6

Why would you add IP addresses to a containment policy?

Options:
A.

You want to automate the Network Containment process based on the IP address of a host

B.

A new group of analysts need to be able to place hosts under Network Containment

C.

Your organization has resources that need to be accessible when hosts are network contained

D.

Your organization has additional IP addresses that need to be able to access the Falcon console

Questions 7

You need to look up a Red Hat Enterprise Linux (RHEL) system in Host Management. What filter would apply?

Options:
A.

Platform

B.

OS version

C.

Type

D.

OU

Questions 8

How are custom roles assigned to users to perform a specific action on a module?

Options:
A.

Users get all permissions by default

B.

Permissions are enabled in roles, and these roles are assigned to users

C.

By adding each module to a role

D.

Permissions are assigned to users directly in user management

Questions 9

You will be testing detections with pentest and security tooling on your host. How can a workflow be created to automatically assign any detection related to your pentest to yourself in real time?

Options:
A.

Create an Event trigger workflow that triggers on an EPP Detection with an action to assign the detection to yourself

B.

Create an Event trigger workflow that triggers on an EPP Detection with conditions looking for the desired hostname

C.

Create an alert on usage of the tools and assign the alerts to you automatically via workflow

D.

Create an IOC for the host to trigger associated detections and assign them to you via workflow

Questions 10

What prevention policy setting prevents sensor-related files, folders, and registry objects from being renamed or deleted?

Options:
A.

Host Modification Protection

B.

System Configuration Protection

C.

Sensor Tampering Protection

D.

Sensor Modification Protection

Exam Code: CCFA-200b
Certification Provider: CrowdStrike
Exam Name: CrowdStrike Falcon Certification Program
Last Update: May 23, 2026
Questions: 100