According to the CrowdStrike Falcon® Data Replicator (FDR) Add-on for Splunk Guide, the Always Block action allows you to block a file from executing on any host in your organization based on its hash value2. This action can be used to prevent known malicious files from running on your endpoints2.
Question 2
When examining raw event data, what is the purpose of the field called ParentProcessld_decimal?
Options:
A.
It contains an internal value not useful for an investigation
B.
It contains the TargetProcessld_decimal value of the child process
C.
It contains the Sensorld_decimal value for related events
D.
It contains the TargetProcessld_decimal of the parent process
Answer:
D
Explanation:
Explanation:
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the ParentProcessld_decimal field contains the decimal value of the process ID of the parent process that spawned or injected into the target process1. This field can be used to trace the process lineage and identify malicious or suspicious activities1.
Question 3
When reviewing a Host Timeline, which of the following filters is available?
Options:
A.
Severity
B.
Event Types
C.
User Name
D.
Detection ID
Answer:
B
Explanation:
Explanation:
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Host Timeline tool allows you to view all events recorded by the sensor for a given host in a chronological order1. The events include process executions, file writes, registry modifications, network connections, user logins, etc1. You can use various filters to narrow down the events based on criteria such as event type, timestamp range, file name, registry key, network destination, etc1. However, there is no filter for severity, user name, or detection ID, as these are not attributes of the events1.