Exam CCFR-201 All QuestionsBrowse all questions from this exam
Question 3

How does a DNSRequest event link to its responsible process?

    Correct Answer: C

    A DNSRequest event is linked to its responsible process via its ContextProcessId_decimal field. This field captures the process context associated with the DNS request, identifying the process that initiated the DNS resolution request, which is essential for understanding and analyzing network activities related to security events.

Discussion
kangaruOption: C

It's responsible process is referred using ContextProcessId_demical

silva222222Option: C

ContextProcessId_decimal is designed to capture the broader process context associated with the DNS request. This context can include the process that ultimately initiated the DNS resolution request, even if there were intermediary steps involved. This information is crucial for security analysts to understand which process is making external communication attempts and potentially identify malicious activity.

jolujo10Option: C

Answer is C

alanalanalanOption: C

Answer is C, C. Via its ContextProcessId_decimal field Refer to the document "Falcon Documentation > Endpoint Security > Event Investigation > Hunting and Investigation", the example is : Uncommon processes making network connections or DNS Requests : aid=my-aid event_simpleName="DnsRequest" | rename ContextProcessId_decimal as TargetProcessId_decimal | join TargetProcessId_decimal [search aid=my-aid event_simpleName="ProcessRollup2" ImageFileName="*PROCESS"] | table ComputerName timestamp ImageFileName DomainName CommandLine

alanalanalanOption: C

Answer is C, C. Via its ContextProcessId_decimal field Refer to the document "Falcon Documentation > Endpoint Security > Event Investigation > Hunting and Investigation", the example is : Uncommon processes making network connections or DNS Requests : aid=my-aid event_simpleName="DnsRequest" | rename ContextProcessId_decimal as TargetProcessId_decimal | join TargetProcessId_decimal [search aid=my-aid event_simpleName="ProcessRollup2" ImageFileName="*PROCESS"] | table ComputerName timestamp ImageFileName DomainName CommandLine

sbag0024Option: D

D is correct. TargetprocessID_d is always the one responsible for the action.

sbag0024

Hum it might be Contextprocessid_d.. not sure here now..

kangaru

#event_simpleName=DnsRequest doesn't have TargetProcessId_decimal field

Tiago90Option: D

correct is D