CCFR-201 Exam QuestionsBrowse all questions from this exam

CCFR-201 Exam - Question 3


How does a DNSRequest event link to its responsible process?

Show Answer
Correct Answer: C

A DNSRequest event is linked to its responsible process via its ContextProcessId_decimal field. This field captures the process context associated with the DNS request, identifying the process that initiated the DNS resolution request, which is essential for understanding and analyzing network activities related to security events.

Discussion

7 comments
Sign in to comment
kangaruOption: C
Feb 10, 2024

It's responsible process is referred using ContextProcessId_demical

silva222222Option: C
May 19, 2024

ContextProcessId_decimal is designed to capture the broader process context associated with the DNS request. This context can include the process that ultimately initiated the DNS resolution request, even if there were intermediary steps involved. This information is crucial for security analysts to understand which process is making external communication attempts and potentially identify malicious activity.

Tiago90Option: D
Dec 2, 2023

correct is D

sbag0024Option: D
Jan 31, 2024

D is correct. TargetprocessID_d is always the one responsible for the action.

sbag0024
Jan 31, 2024

Hum it might be Contextprocessid_d.. not sure here now..

kangaru
Feb 11, 2024

#event_simpleName=DnsRequest doesn't have TargetProcessId_decimal field

alanalanalanOption: C
May 21, 2024

Answer is C, C. Via its ContextProcessId_decimal field Refer to the document "Falcon Documentation > Endpoint Security > Event Investigation > Hunting and Investigation", the example is : Uncommon processes making network connections or DNS Requests : aid=my-aid event_simpleName="DnsRequest" | rename ContextProcessId_decimal as TargetProcessId_decimal | join TargetProcessId_decimal [search aid=my-aid event_simpleName="ProcessRollup2" ImageFileName="*PROCESS"] | table ComputerName timestamp ImageFileName DomainName CommandLine

alanalanalanOption: C
May 21, 2024

Answer is C, C. Via its ContextProcessId_decimal field Refer to the document "Falcon Documentation > Endpoint Security > Event Investigation > Hunting and Investigation", the example is : Uncommon processes making network connections or DNS Requests : aid=my-aid event_simpleName="DnsRequest" | rename ContextProcessId_decimal as TargetProcessId_decimal | join TargetProcessId_decimal [search aid=my-aid event_simpleName="ProcessRollup2" ImageFileName="*PROCESS"] | table ComputerName timestamp ImageFileName DomainName CommandLine

jolujo10Option: C
Jun 4, 2024

Answer is C