100+ Free CCFH Practice Questions
Pass your CrowdStrike Certified Falcon Hunter (CCFH) exam on the first try — instant access, no signup required.
Which CrowdStrike Falcon module is specifically designed for proactive threat hunting performed by human analysts on top of the Falcon platform telemetry?
Key Facts: CCFH Exam
60
Exam Questions
CrowdStrike (CCFH-202)
90 min
Exam Duration
CrowdStrike
$250
Exam Fee
CrowdStrike
3 years
Cert Valid
CrowdStrike
Pearson VUE
Delivery
CrowdStrike
100
Free Practice Qs
OpenExamPrep
The CCFH (CCFH-202) exam targets the investigative analyst performing detection analysis, machine timelining, event search, insider-threat investigations, and proactive threat hunting on the CrowdStrike Falcon platform. It is delivered via Pearson VUE, costs $250 per attempt, runs ~90 minutes, and covers Event Search (FQL), Investigate App pivots, Process Tree analysis, Real Time Response, MITRE ATT&CK mapping, Custom IOAs, OverWatch leads, Falcon X intelligence, and Falcon Identity Threat Protection. The credential is valid for three years.
Sample CCFH Practice Questions
Try these sample questions to test your CCFH exam readiness. Each question includes a detailed explanation. Start the interactive quiz above for the full 100+ question experience with AI tutoring.
1Which CrowdStrike Falcon module is specifically designed for proactive threat hunting performed by human analysts on top of the Falcon platform telemetry?
2A hunter pivots from a suspicious detection to view every event the sensor recorded for that host in chronological order. Which Falcon investigation view is being used?
3Which acronym best describes the CrowdStrike concept of an Indicator of Attack (IOA)?
4In the Falcon Event Search workbench, which query language is used to filter and pivot through events?
5A hunter wants to find every host that contacted a specific suspicious second-level domain over the last 7 days, including hosts where no detection fired. Which built-in Falcon search is the most efficient first step?
6Which MITRE ATT&CK tactic best categorizes an adversary using `whoami`, `net group "domain admins"`, and `systeminfo` shortly after gaining a shell?
7When triaging a detection in the Falcon console, which view shows the full parent-to-child execution lineage of the suspicious process?
8A hunter needs to grab a suspicious binary from an endpoint to a sandbox for further analysis, while preserving evidence. Which Real Time Response (RTR) command transfers the file from the host to the Falcon cloud?
9Which RTR command lists currently-running processes on a target endpoint?
10Which Falcon module enriches investigations with adversary attribution, malware family information, and TTP intelligence reports?
About the CCFH Exam
The CrowdStrike Certified Falcon Hunter (CCFH) validates an investigative analyst's ability to perform deeper detection analysis and response, machine timelining, event-related search queries (FQL), insider-threat investigations, and proactive threat hunting using the CrowdStrike Falcon platform. Hunters are expected to fluently use Event Search, the Investigate App, Process Tree analysis, Hash Search, Bulk Domain Search, Real Time Response, MITRE ATT&CK mapping, Custom IOAs, OverWatch leads, and Falcon X / Falcon Identity Threat Protection / NG-SIEM signals.
Questions
60 scored questions
Time Limit
90 minutes
Passing Score
Set by CrowdStrike (not publicly disclosed)
Exam Fee
$250 (CrowdStrike University (delivered via Pearson VUE))
CCFH Exam Content Outline
Threat Hunting Methodology & MITRE ATT&CK
Hypothesis-driven hunting, IOC vs anomaly vs TTP-based hunts, mapping detections and hunts to MITRE ATT&CK tactics and techniques, and OverWatch lead handling
Event Search (FQL) & Investigation Tools
Falcon Query Language pipes (search, eval, stats, dc, table), Investigate App, Hash Search, Bulk Domain Search, Process Tree, Machine Timeline, and field reference (aid, CommandLine, ProcessRollup2)
Detection Analysis & Custom IOAs
Triaging detections, severity, pattern_disposition, parent/child analysis, LOLBin tradecraft, and authoring durable Custom IOAs from mature hunts
Real Time Response for Hunters
RTR commands (cd, ls, ps, netstat, runscript, get, put, kill, mv, mkdir), evidence preservation order, and Response Scripts & Files library usage
Falcon X, Identity Threat Protection & NG-SIEM
Adversary attribution (BEAR/PANDA/SPIDER/CHOLLIMA/KITTEN/JACKAL), Falcon Sandbox, Identity-side hunting (NTLM/Kerberos), and NG-SIEM correlation across third-party logs
How to Pass the CCFH Exam
What You Need to Know
- Passing score: Set by CrowdStrike (not publicly disclosed)
- Exam length: 60 questions
- Time limit: 90 minutes
- Exam fee: $250
Keys to Passing
- Complete 500+ practice questions
- Score 80%+ consistently before scheduling
- Focus on highest-weighted sections
- Use our AI tutor for tough concepts
CCFH Study Tips from Top Performers
Frequently Asked Questions
What is the CCFH exam format?
The CCFH (CCFH-202) is a closed-book proctored exam delivered through Pearson VUE on behalf of CrowdStrike University. CrowdStrike's published guidance indicates approximately 60 questions in 90 minutes, focused on investigation, hunting, and detection analysis using the Falcon platform.
How much does the CCFH exam cost?
The CCFH attempt fee is $250 USD per appointment via Pearson VUE. Recommended preparation includes the Falcon Hunter (CFCH/CCFH-202) training through CrowdStrike University and at least 6 months of hands-on Falcon platform experience.
How long is CCFH valid for?
The CrowdStrike Certified Falcon Hunter credential is valid for 3 years from the date of issue. Recertification requires retaking the current exam (CCFH-202) before expiration.
How does CCFH compare to CCFA and CCFR?
CCFA (Administrator) focuses on platform configuration and policy. CCFR (Responder) focuses on incident response. CCFH (Hunter) goes deepest on Event Search (FQL), pivot/investigation workflows, MITRE ATT&CK-driven hunting, and proactive detection analysis.
What hands-on skills should I have before sitting CCFH?
You should be comfortable with FQL queries against ProcessRollup2, DnsRequest, NetworkConnectIP4, FileWritten, and UserLogon events; using the Investigate App, Hash Search, Bulk Domain Search, Process Tree, and Machine Timeline; running Real Time Response sessions; mapping detections to MITRE ATT&CK; and authoring Custom IOAs from a hunting hypothesis.