After pivoting to an event search from a detection, you locate the ProcessRollup2 event. Which two field values are you required to obtain to perform a Process Timeline search so you can determine what the process was doing?
A. SHA256 and TargetProcessld_decimal
B. SHA256 and ParentProcessld_decimal
C. aid and ParentProcessld_decimal
D. aid and TargetProcessld_decimal
How long are quarantined files stored on the host?
A. 45 Days
B. 30 Days
C. Quarantined files are never deleted from the host
D. 90 Days
A list of managed and unmanaged neighbors for an endpoint can be found:
A. by using Hosts page in the Investigate tool
B. by reviewing "Groups" in Host Management under the Hosts page
C. under "Audit" by running Sensor Visibility Exclusions Audit
D. only by searching event data using Event Search
What happens when a hash is set to Always Block through IOC Management?
A. Execution is prevented on all hosts by default
B. Execution is prevented on selected host groups
C. Execution is prevented and detection alerts are suppressed
D. The hash is submitted for approval to be blocked from execution once confirmed by Falcon specialists
What are Event Actions?
A. Automated searches that can be used to pivot between related events and searches
B. Pivotable hyperlinks available in a Host Search
C. Custom event data queries bookmarked by the currently signed in Falcon user
D. Raw Falcon event data
When you configure and apply an IOA exclusion, what impact does it have on the host and what you see in the console?
A. The process specified is not sent to the Falcon Sandbox for analysis
B. The associated detection will be suppressed and the associated process would have been allowed to run
C. The sensor will stop sending events from the process specified in the regex pattern
D. The associated IOA will still generate a detection but the associated process would have been allowed to run
What does the Full Detection Details option provide?
A. It provides a visualization of program ancestry via the Process Tree View
B. It provides a visualization of program ancestry via the Process Activity View
C. It provides detailed list of detection events via the Process Table View
D. It provides a detailed list of detection events via the Process Tree View
The Bulk Domain Search tool contains Domain information along with which of the following?
A. Process Information
B. Port Information
C. IP Lookup Information
D. Threat Actor Information
After running an Event Search, you can select many Event Actions depending on your results. Which of the following is NOT an option for any Event Action?
A. Draw Process Explorer
B. Show a +/- 10-minute window of events
C. Show a Process Timeline for the responsible process
D. Show Associated Event Data (from TargetProcessld_decimal or ContextProcessld_decimal)
Which of the following is an example of a MITRE ATTandCK tactic?
A. Eternal Blue
B. Defense Evasion
C. Emotet
D. Phishing