According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Process Timeline tool allows you to view all cloudable events associated with a given process, such as process creation, network connections, file writes, registry modifications, etc2. You can also filter the events by various criteria, such as event type, timestamp range, file name, registry key, network destination, etc2. This is an advantage of using the Process Timeline tool because it allows you to focus on specific events that are relevant to your investigation2.
Question 17
When examining raw event data, what is the purpose of the field called ParentProcessld_decimal?
Options:
A.
It contains an internal value not useful for an investigation
B.
It contains the TargetProcessld_decimal value of the child process
C.
It contains the Sensorld_decimal value for related events
D.
It contains the TargetProcessld_decimal of the parent process
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the ParentProcessld_decimal field contains the decimal value of the process ID of the parent process that spawned or injected into the target process1. This field can be used to trace the process lineage and identify malicious or suspicious activities1.
Question 18
What is the difference between a Host Search and a Host Timeline?
Options:
A.
Results from a Host Search return information in an organized view by type, while a Host Timeline returns a view of all events recorded by the sensor
B.
A Host Timeline only includes process execution events and user account activity
C.
Results from a Host Timeline include process executions and related events organized by data type. A Host Search returns a temporal view of all events for the given host
D.
There is no difference - Host Search and Host Timeline are different names for the same search page
According to the CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+, the Host Search allows you to search for hosts based on various criteria, such as hostname, IP address, OS, etc1. The results are displayed in an organized view by type, such as detections, incidents, processes, network connections, etc1. The Host Timeline allows you to view all events recorded by the sensor for a given host in a chronological order1. The events include process executions, file writes, registry modifications, network connections, user logins, etc1.