CrowdStrike Certified Cloud Specialist Questions and Answers
What can you use to specify which assets to check against IOMs and Image assessment policies while leveraging the Falcon Kubernetes Admission Controller?
You are investigating potential data exfiltration by reviewing IOAs in Falcon Cloud Security. You must check for any evidence of Defense Evasion via Impair Defenses: Disable or Modify Tools activity in your Azure environment.
Which IOA filters meet those requirements to identify any related IOAs?
You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful, but certain CSPM operations—including asset inventories and IOM detection—are failing.
How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?
Which three image attributes can a cloud group be applied to?
What activities are carried out during the cloud inventory phase of image assessment?
You suspect that there is malware in one of your container images.
What can you investigate to confirm this?
You want to deploy the Falcon sensor using 1-click sensor deployment when AWS Systems Manager is unavailable.
Which IT automation software can you use to generate an inventory of unmanaged workloads?
Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.
How can you automatically distribute the vulnerable container information from Cloud Security?
You are investigating unassessed images using Falcon Cloud Security.
What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?
You are concerned about an overprivileged cloud identity.
What steps should you take to identify issues with the account's permissions?
What is needed to achieve visibility into the latest AWS IAM 1020 restricted use of AWS CloudShell with the latest CIS Foundations Benchmarks for AWS, Azure, and Google Cloud?
What criteria can you use to create exclusions for cloud scans?
How can unassessed images be a security concern in your cloud environment?
When registering in AWS, what option is recommended to increase your security posture?
You need to register one AWS account as part of a deployment of Falcon Cloud Security. You decide to complete the registration process in the Falcon UI.
What will be utilized during this process if you choose the recommended method to register an individual AWS account?
You have misconfigurations left undone in your AWS environment. This has caused you to rely on a third party or your limited internal desktop security team that lacks cloud consciousness.
What Cloud Security Posture Management setting can you set up to help your security team save time?
What are the three Image properties that can be selected when editing a Cloud Group?