crowdstrike CCFA-200 Exam Questions

Questions for the CCFA-200 were updated on : Nov 21 ,2025

Page 1 out of 11. Viewing questions 1-15 out of 153

Question 1

What can exclusions be applied to?

  • A. Individual hosts selected by the administrator
  • B. Either all hosts or specified groups
  • C. Only the default host group
  • D. Only the groups selected by the administrator
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that describes what exclusions can be applied to is that exclusions can be applied to
either all hosts or specified groups. An exclusion is a rule that defines what files, folders, processes,
IP addresses, or domains should be excluded from detection or prevention by the Falcon sensor. You
can create and manage exclusions in the Exclusions page in the Falcon console. You can apply
exclusions to either all hosts in your environment or to specific host groups that you select. You
cannot apply exclusions to individual hosts selected by the administrator.
Reference: : [Cybersecurity Resources | CrowdStrike]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

You have a Windows host on your network in Reduced functionality mode (RFM). While the system is
in RFM, which of the following is TRUE?

  • A. System monitoring will be unavailable
  • B. Event reporting will be unavailable
  • C. Prevention patterns will not be triggered
  • D. Some detection patterns and preventions will not be triggered
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that is true when a Windows host is in Reduced Functionality Mode (RFM) is that some
detection patterns and preventions will not be triggered. RFM is a mode that limits the sensor’s
functionality due to license expiration, network connectivity loss, or certificate validation failure.
When a Windows sensor is in RFM, it will only provide basic prevention capabilities, such as blocking
known malware hashes and preventing script execution from the %TEMP% directory. The sensor will
not send any telemetry or detection events to the Falcon platform, and will not receive any policy or
update changes from the Falcon cloud. This means that some detection patterns and preventions
that rely on telemetry, machine learning, or cloud analysis will not be triggered.
Reference: : [Falcon Administrator Learning Path | Infographic | CrowdStrike]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

A sensor that has not contacted the Falcon cloud will be automatically deleted from the hosts list
after how many days?

  • A. 45 Days
  • B. 60 Days
  • C. 30 Days
  • D. 90 Days
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
A sensor that has not contacted the Falcon cloud will be automatically deleted from the hosts list
after 90 days. A sensor that has not contacted the Falcon cloud for more than seven days is
considered inactive and will be moved from the Host Management page to the Trash page. An
inactive sensor will remain in the Trash page for 90 days before being permanently deleted from the
Falcon platform. You can restore an inactive sensor from the Trash page if it contacts the Falcon cloud
again within 90 days.
Reference: : [Falcon Administrator Learning Path | Infographic | CrowdStrike]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

When a host belongs to more than one host group, how is sensor update precedence determined?

  • A. Groups have no impact on sensor update policies
  • B. Sensors of hosts that belong to more than one group must be manually updated
  • C. The highest precedence policy from the most important group is applied to the host
  • D. All of the host's groups are examined in aggregate and the policy with highest precedence is applied to the host
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that describes how sensor update precedence is determined when a host belongs to
more than one host group is that all of the host’s groups are examined in aggregate and the policy
with highest precedence is applied to the host. A Sensor Update policy is a policy that controls how
and when the Falcon sensor is updated on a host. You can create and assign custom Sensor Update
policies to different hosts or groups in your environment. Each Sensor Update policy has a
precedence value, which determines its priority over other policies. The higher the precedence
value, the higher the priority. If a host belongs to more than one host group, each with a different
Sensor Update policy assigned, then all of the host’s groups are examined in aggregate and the policy
with highest precedence among them is applied to the host.
Reference: : [Falcon Administrator Learning Path | Infographic | CrowdStrike]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

What may prevent a user from logging into Falcon via single sign-on (SSO)?

  • A. The SSO username doesn't match their email address in Falcon
  • B. The maintenance token has expired
  • C. Falcon is in reduced functionality mode
  • D. The user never configured their security questions
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
: The option that may prevent a user from logging into Falcon via single sign-on (SSO) is that the SSO
username doesn’t match their email address in Falcon. SSO is a feature that allows you to use an
external identity provider (IdP) to authenticate and authorize users to access the Falcon platform.
SSO simplifies and streamlines the login process, as users only need to remember one set of
credentials for multiple applications. However, SSO requires that the username in the IdP matches
the email address in Falcon for each user. If there is a mismatch between the username and the
email address, the user will not be able to log into Falcon via SSO.
Reference: : [Cybersecurity Resources | CrowdStrike]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

The Customer ID (CID) is important in which of the following scenarios?

  • A. When adding a user to the Falcon console under the Users application
  • B. When performing the sensor installation process
  • C. When setting up API keys
  • D. When performing a Host Search
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The Customer ID (CID) is important in which of the following scenarios: when performing the sensor
installation process and when setting up API keys. The CID is a unique identifier for your organization
that is required for authenticating your sensor installation and communication with the Falcon cloud.
You need to provide your CID when installing the Falcon sensor on a host, either by using a
command-line parameter or by using the falconctl tool. The CID is also required for setting up API
keys, which are used for accessing the Falcon platform programmatically via the Falcon APIs. You
need to provide your CID when creating an API client and key in the API Clients and Keys page in the
Falcon console.
Reference: : [Cybersecurity Resources | CrowdStrike]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

You need to have the ability to monitor suspicious VBA macros. Which Sensor Visibility setting should
be turned on within the Prevention policy settings?

  • A. Script-based Execution Monitoring
  • B. Interpreter-Only
  • C. Additional User Mode Data
  • D. Engine (Full Visibility)
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Turn on the Script-Based Execution Monitoring prevention policy setting to enable the "Falcon sensor
to monitor the contents of scripts and shells that are popular mechanisms for executing malicious
code on hosts. This setting does not kill or block scripts."
Scripting languages:
Excel 4.0 macros
JScript
VBA Macros
VBScript
The Sensor Visibility setting that should be turned on within the Prevention policy settings to monitor
suspicious VBA macros is Script-based Execution Monitoring. Script-based Execution Monitoring is a
feature that enables the Falcon sensor to monitor and prevent malicious script execution on
Windows systems. The feature uses machine learning and behavioral analysis to detect suspicious
scripts or commands executed by various script interpreters, such as PowerShell, WScript, CScript, or
Bash. VBA (Visual Basic for Applications) is a scripting language that can be embedded in Microsoft
Office documents, such as Word or Excel. VBA macros can be used to automate tasks or perform
actions within the documents, but they can also be abused by attackers to deliver malware or
execute malicious code. Script-based Execution Monitoring can help detect and prevent such attacks
by monitoring the contents of VBA macros for execution of malicious content.
Reference: : [Falcon Administrator Learning Path | Infographic | CrowdStrike]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What is the purpose of the Machine-Learning Prevention Monitoring Report?

  • A. It is designed to give an administrator a quick overview of machine-learning aggressiveness settings as well as the numbers of items actually quarantined
  • B. It is the dashboard used by an analyst to view all items quarantined and to release any items deemed non-malicious
  • C. It is the dashboard used to see machine-learning preventions, and it is used to identify spikes in activity and possible targeted attacks
  • D. It is designed to show malware that would have been blocked in your environment based on different Machine-Learning Prevention settings
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Machine-Learning Prevention Monitoring dashboard: Use this dashboard to view malware that
would have been blocked in your environment over the selected timeframe based on different
Machine Learning Prevention settings (Cautious, Moderate, Aggressive or Extra Aggressive).

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

The Falcon Administrator has created a new prevention policy to apply to the "Servers" group;
however, when applying the new prevention policy this group is not appearing in the list of available
groups. What is the most likely issue?

  • A. The new prevention policy should be enabled first
  • B. The "Servers" group already has a policy applied to it
  • C. The "Servers" group must be disabled first
  • D. Host type was not defined correctly within the prevention policy
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The most likely issue for not being able to apply a new prevention policy to the “Servers” group is
that the “Servers” group already has a policy applied to it. A prevention policy is a policy that defines
the prevention capabilities and settings for the Falcon sensor on a host. You can create and assign
custom prevention policies to different hosts or groups in your environment. However, you can only
assign one prevention policy per host or group at a time.
If a host or group already has a prevention
policy applied to it, you cannot apply another prevention policy to it unless you remove or replace
the existing one2
.
Reference: 2
:
Cybersecurity Resources | CrowdStrike

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following prevention policy settings monitors contents of scripts and shells for
execution of malicious content on compatible operating systems?

  • A. Script-based Execution Monitoring
  • B. FileSystem Visibility
  • C. Engine (Full Visibility)
  • D. Suspicious Scripts and Commands
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The prevention policy setting that monitors contents of scripts and shells for execution of malicious
content on compatible operating systems is Script-based Execution Monitoring. Script-based
Execution Monitoring is a feature that enables the Falcon sensor to monitor and prevent malicious
script execution on Windows systems. The feature uses machine learning and behavioral analysis to
detect suspicious scripts or commands executed by various script interpreters, such as PowerShell,
WScript, CScript, or Bash.
You can enable or disable Script-based Execution Monitoring in the
Prevention Policy for Windows hosts1
.
Reference: 1
:
Falcon Administrator Learning Path | Infographic | CrowdStrike

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

What best describes the relationship between Sensor Update policies and Operating Systems?

  • A. Windows and Mac share Sensor Update policies. Linux requires its own set of polices based on the different kernel versions
  • B. Sensor Update polices are not Operating System specific. One policy can be applied to all Operating Systems
  • C. Windows has its own Sensor Update polices. But Mac and Linux share Sensor Update policies
  • D. A Sensor Update policy must be configured for each Operating System (Windows, Mac, Linux)
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that describes the relationship between Sensor Update policies and Operating Systems is
that a Sensor Update policy must be configured for each Operating System (Windows, Mac, Linux).
This option is essentially a repetition of question 141 and its answer. Sensor Update policies are
specific to each operating system type, as different operating systems have different sensor versions,
features, and requirements.
Therefore, you need to create and assign separate Sensor Update
policies for each operating system type in your environment1
.
Reference: 1
:
Falcon Administrator Learning Path | Infographic | CrowdStrike

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

What is the purpose of the Default Sensor Policy?

  • A. A mechanism to deploy the oldest supported version of the Falcon Sensor.
  • B. Tests the sensor configuration settings before deployment.
  • C. Used to reset all sensor settings to Default.
  • D. Acts as a "catch all" policy if no other Sensor Policies are applied.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The purpose of the Default Sensor Policy is that it acts as a “catch all” policy if no other Sensor
Policies are applied. A Sensor Policy is a policy that defines the detection and prevention settings for
the Falcon sensor on a host. You can create and assign custom Sensor Policies to different hosts or
groups in your environment. However, if a host is not assigned to a specific Sensor Policy, it will
inherit the settings from the Default Sensor Policy. The Default Sensor Policy is a “catch-all” policy
that is enabled by default and has the “Malware Protection” feature turned on.
You can modify the
settings of the Default Sensor Policy, but you cannot delete or disable it1
.
Reference: 1
:
Falcon Administrator Learning Path | Infographic | CrowdStrike

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Why do Sensor Update policies need to be configured for each OS (Windows, Mac, Linux)?

  • A. To bundle the Sensor and Prevention policies together into a deployment package
  • B. Sensor Update policies are OS dependent
  • C. To assist with auditing and change management
  • D. This is false. One policy can be applied to all Operating Systems
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Sensor Update policies need to be configured for each OS (Windows, Mac, Linux) because Sensor
Update policies are OS dependent. A Sensor Update policy is a policy that controls how and when
the Falcon sensor is updated on a host. Sensor Update policies are specific to each operating system
type, as different operating systems have different sensor versions, features, and
requirements.
Therefore, you need to create and assign separate Sensor Update policies for each
operating system type in your environment1
.
Reference: 1
:
Falcon Administrator Learning Path | Infographic | CrowdStrike

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which statement describes what is recommended for the Default Sensor Update policy?

  • A. The Default Sensor Update policy should align to an organization's overall sensor updating practice while leveraging Auto N-1 and Auto N-2 configurations where possible
  • B. The Default Sensor Update should be configured to always automatically upgrade to the latest sensor version
  • C. Since the Default Sensor Update policy is pre-configured with recommend settings out of the box, configuration of the Default Sensor Update policy is not required
  • D. No configuration is required. Once a Custom Sensor Update policy is created the Default Sensor Update policy is disabled
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The statement that describes what is recommended for the Default Sensor Update policy is that the
Default Sensor Update policy should align to an organization’s overall sensor updating practice while
leveraging Auto N-1 and Auto N-2 configurations where possible. As explained in question 139, the
Default Sensor Update policy is a “catch-all” policy that applies to any host that is not assigned to a
specific Sensor Update policy. Therefore, it is recommended that the Default Sensor Update policy
should align to your organization’s overall sensor updating practice, such as how frequently and how
quickly you want to update your sensors.
It is also recommended that you leverage the Auto N-1 and
Auto N-2 configurations, which allow you to automatically update your sensors to the latest or
second-latest sensor version without requiring manual intervention1
.
Reference: 1
:
Falcon Administrator Learning Path | Infographic | CrowdStrike

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

What will happen to a host if it is not assigned a Sensor Update policy?

  • A. The host will uninstall the Sensor and provide an alert to the installation team
  • B. The host will automatically update to the newest sensor version and auto-update to future release
  • C. The host will automatically create a custom Sensor Update policy
  • D. The host will use the Default Sensor Update policy
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that describes what will happen to a host if it is not assigned a Sensor Update policy is
that the host will use the Default Sensor Update policy. A Sensor Update policy is a policy that
controls how and when the Falcon sensor is updated on a host. You can create and assign custom
Sensor Update policies to different hosts or groups in your environment. However, if a host is not
assigned to a specific Sensor Update policy, it will inherit the settings from the Default Sensor Update
policy. The Default Sensor Update policy is a “catch-all” policy that is enabled by default and has the
“Uninstall and Maintenance Protection” feature turned on.
You can modify the settings of the Default
Sensor Update policy, but you cannot delete or disable it1
.
Reference: 1
:
Falcon Administrator Learning Path | Infographic | CrowdStrike

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2