All Practice Exams

100+ Free CCFR Practice Questions

Pass your CrowdStrike Certified Falcon Responder (CCFR) exam on the first try — instant access, no signup required.

✓ No registration✓ No credit card✓ No hidden fees✓ Start practicing immediately
Not published Pass Rate
100+ Questions
100% Free
1 / 100
Question 1
Score: 0/0

A Falcon analyst opens the Activity > Detections page and sees a new detection that has not yet been touched. What status is automatically assigned to the detection at this point?

A
B
C
D
to track
2026 Statistics

Key Facts: CCFR Exam

60

Approximate Exam Questions

CrowdStrike CCFR blueprint

90 min

Exam Duration

CrowdStrike

Pearson VUE

Delivery

CrowdStrike University

3 years

Certification Validity

CrowdStrike

Free

Exam Fee (customers)

CrowdStrike

6

Detection Lifecycle States

Falcon Console

The CCFR exam is CrowdStrike's responder-tier credential built for SOC analysts who own detection triage in the Falcon console. The 90-minute exam covers the detection lifecycle (New, In Progress, True Positive, False Positive, Closed, Ignored), severity triage (Low/Medium/High/Critical), Real Time Response, Network Containment, Custom IOA authoring (process/file/registry/network), IOC allow- and block-listing, Workflows for auto-containment, Spotlight, Falcon Identity, and MITRE ATT&CK Matrix interpretation. The credential is valid for 3 years and is delivered through Pearson VUE.

Sample CCFR Practice Questions

Try these sample questions to test your CCFR exam readiness. Each question includes a detailed explanation. Start the interactive quiz above for the full 100+ question experience with AI tutoring.

1A Falcon analyst opens the Activity > Detections page and sees a new detection that has not yet been touched. What status is automatically assigned to the detection at this point?
A.In Progress
B.True Positive
C.New
D.Closed
Explanation: Every Falcon detection enters the queue with the status 'New' until an analyst takes action. From New, the detection can move to In Progress while triage is underway, then to a terminal state of True Positive, False Positive, Closed, or Ignored.
2Which Falcon detection severity level represents the highest risk and warrants the fastest analyst response?
A.Informational
B.High
C.Critical
D.Medium
Explanation: Falcon assigns one of four operational severities to detections: Low, Medium, High, and Critical. Critical is the highest, typically representing confirmed malicious behavior such as ransomware staging, credential theft, or post-exploitation tradecraft, and is the queue item analysts must act on first.
3A Falcon Responder needs to immediately stop a compromised Windows host from communicating with attacker infrastructure while preserving the sensor's connection to the Falcon cloud. Which action should they take from the Host Management page?
A.Uninstall the sensor
B.Place the host in Network Containment
C.Disable Detection policy
D.Reset the host's CID
Explanation: Network Containment isolates a host so it can only communicate with the Falcon cloud and any IPs explicitly added to the containment allowlist. The sensor stays online, allowing RTR and continued detection telemetry, while attacker C2 traffic is blocked.
4Which Falcon feature allows an analyst to open an interactive shell on a remote host and execute commands such as ls, ps, and reg query without leaving the Falcon console?
A.Falcon Insight
B.Real Time Response (RTR)
C.Spotlight
D.Falcon Identity
Explanation: Real Time Response (RTR) gives analysts an interactive command shell to a host through the Falcon sensor. Built-in commands such as ls, ps, cd, get, put, runscript, reg query, kill, and netstat let responders triage and remediate without an out-of-band remote tool.
5Within a Falcon detection, the visualization that shows the parent process, the triggering process, and any spawned children in a hierarchical tree is called the:
A.Process Tree
B.MITRE Matrix
C.Threat Graph diagram
D.Event Search timeline
Explanation: The Process Tree on the detection details page renders the full parent/child process chain around the triggering behavior, with each node showing the binary, command line, and any associated detections. It is the primary visual aid for understanding execution context.
6Which of the following is NOT a valid resolution status that an analyst can set on a Falcon detection?
A.True Positive
B.False Positive
C.Resolved-by-Vendor
D.Ignored
Explanation: Falcon's terminal detection statuses are True Positive, False Positive, Closed, and Ignored (in addition to the open states New and In Progress). 'Resolved-by-Vendor' is not a status in the Falcon console.
7Spotlight in the Falcon platform is designed primarily to help responders with which task?
A.Manage Real Time Response sessions
B.Triage and prioritize host vulnerabilities
C.Author Custom IOA rules
D.Push sensor updates to host groups
Explanation: Spotlight is CrowdStrike's exposure-management module. It uses the Falcon sensor (no extra agent or scan) to inventory installed software, map CVEs, and present an ExPRT.AI-prioritized vulnerability list so responders can fix what is actually exploitable first.
8An analyst confirms that an executed PowerShell script was a legitimate IT admin tool and the alert was not malicious. Which detection status best captures this outcome?
A.True Positive
B.False Positive
C.In Progress
D.New
Explanation: False Positive is the correct terminal status when investigation determines the triggering activity was benign or expected. Marking it accurately feeds Falcon's tuning data and helps suppress similar low-value detections in the future.
9In Falcon, the categories of evidence shown on the Detection Details page include Behaviors, Indicators, Process, Network, and which one of the following?
A.File
B.Email
C.BIOS
D.Phone
Explanation: Detection Details organizes evidence into Behaviors, Indicators, Process, Network, and File panes. The File pane lists hashes, paths, signatures, and prevalence for binaries involved in the detection.
10Which Custom IOA rule type would you use to alert on any process attempting to write a file with a .lnk extension into the Startup folder?
A.Network-based
B.Registry-based
C.File-based
D.Domain-based
Explanation: File-based Custom IOAs evaluate file system actions such as Create/Write/Delete against an image filename, target file path, and process context. Persistence via .lnk in the Startup folder is a textbook file-action pattern caught by a File-Create rule.

About the CCFR Exam

The CrowdStrike Certified Falcon Responder (CCFR) validates the skills of front-line analysts who triage and respond to detections in the CrowdStrike Falcon platform. The exam covers the Falcon detection lifecycle, severity triage and assignment, Real Time Response (RTR), Network Containment, Custom IOA authoring, IOC management, Falcon Insight investigations, MITRE ATT&CK mapping, Workflows, Spotlight prioritization, Falcon Identity, Cloud Security alerts, and Falcon for Mobile.

Questions

60 scored questions

Time Limit

90 minutes

Passing Score

Not publicly disclosed

Exam Fee

Free for CrowdStrike customers (Pearson VUE delivery) (CrowdStrike University (delivered via Pearson VUE))

CCFR Exam Content Outline

25%

Detection Lifecycle, Severity, and Triage

New / In Progress / True Positive / False Positive / Closed / Ignored statuses, severity levels (Low/Medium/High/Critical), assignment workflow, queue management, Detection Details panes (Behaviors, Indicators, Process, Network, File), and the Process Tree.

20%

Investigation and Falcon Insight

Process Tree analysis, Detection Details panes, MITRE ATT&CK Matrix view, Hash Search, IOC pivots (hash, domain, IP, user), Incidents (composite cross-host correlation), and Threat Graph queries.

20%

Real Time Response (RTR)

RTR fundamentals, permission levels (Read-Only Analyst / Active Responder / RTR Admin), core commands (ls, ps, cd, get, put, runscript, kill, reg query, netstat), Batch sessions, and Falcon Scripts library.

15%

Containment and Response

Network Containment (isolate host, lift containment, allowlist), Quarantine (file containment), Workflows (auto-actions: Network Contain, Kill Process, Quarantine File, Notify), and incident-response decision making.

15%

Detection Tuning and Custom IOAs

Custom IOA rule types (process-based, file-based, registry-based, network-based), IOC management (allow-list and block-list, with detect-on-block), Sensor Visibility Exclusions, Detection Suppression, and ML prevention sensitivity tuning.

5%

Adjacent Falcon Modules

Spotlight (vulnerability triage with ExPRT.AI), Falcon Identity (identity-attack detection), Falcon Cloud Security (CSPM and workload protection), and Falcon for Mobile.

How to Pass the CCFR Exam

What You Need to Know

  • Passing score: Not publicly disclosed
  • Exam length: 60 questions
  • Time limit: 90 minutes
  • Exam fee: Free for CrowdStrike customers (Pearson VUE delivery)

Keys to Passing

  • Complete 500+ practice questions
  • Score 80%+ consistently before scheduling
  • Focus on highest-weighted sections
  • Use our AI tutor for tough concepts

CCFR Study Tips from Top Performers

1Memorize the detection lifecycle: New -> In Progress -> True Positive / False Positive / Closed / Ignored — and which transitions are valid
2Know the four severity levels (Low, Medium, High, Critical) and what each typically represents
3Memorize the three RTR roles (Read-Only Analyst, Active Responder, RTR Admin) and which commands each can run
4Be fluent in the four Custom IOA rule types: process-execution, file-based, registry-based, network-based — and when to choose each
5Understand Network Containment: sensor stays online, host can only reach Falcon cloud + allowlist; lift containment when remediation is complete
6Practice mapping common behaviors to MITRE ATT&CK techniques: T1059.001 PowerShell, T1003.001 LSASS, T1547.001 Run Keys, T1055 process injection
7Know the difference between IOA (behavior) and IOC (artifact) — IOAs are the harder-to-evade signal CrowdStrike emphasizes
8Understand which Falcon view does what: Detections (queue), Incidents (composite), Investigate (pivots), Spotlight (vulns), Identity (AD attacks)

Frequently Asked Questions

What is the CCFR exam?

The CrowdStrike Certified Falcon Responder (CCFR) certifies front-line SOC analysts who triage and respond to detections in the CrowdStrike Falcon console. The exam validates skills in detection lifecycle management, severity triage, Real Time Response, Network Containment, Custom IOA authoring, IOC management, MITRE ATT&CK mapping, and Falcon Workflows.

How is the CCFR exam delivered?

The CCFR is delivered through Pearson VUE in 90 minutes. CrowdStrike does not publish the exact passing score; expect a multiple-choice format aligned to the published exam blueprint. The certification is valid for 3 years.

Is the CCFR exam free?

The CCFR exam is free for CrowdStrike customers (delivered via the CrowdStrike University training program, with the actual sit-down at Pearson VUE). Non-customers should consult CrowdStrike Partner programs for current access policies.

What is the difference between CCFA, CCFR, and CCFH?

CCFA (Certified Falcon Administrator) focuses on platform administration: sensor deployment, policy management, host groups. CCFR (Certified Falcon Responder) focuses on detection triage and incident response: detection lifecycle, RTR, containment, MITRE ATT&CK. CCFH (Certified Falcon Hunter) focuses on proactive threat hunting using Threat Graph and Event Search.

What topics are most heavily tested on CCFR?

Expect heavy weighting on detection triage (lifecycle status, severity, assignment), Real Time Response commands and permission levels, Network Containment behavior, Custom IOA rule types (process, file, registry, network), and the Detection Details panes (Behaviors, Indicators, Process, Network, File).

How long does the CCFR certification last?

The CCFR is valid for 3 years from the date of passing. To recertify, candidates retake the current version of the exam to ensure their skills remain aligned to the latest Falcon platform.