New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CrowdStrike CCCS-203b Dumps

Page: 1 / 6
Total 58 questions

CrowdStrike Certified Cloud Specialist Questions and Answers

Question 1

What can you use to specify which assets to check against IOMs and Image assessment policies while leveraging the Falcon Kubernetes Admission Controller?

Options:

A.

Pod or Service labels only

B.

Namespaces only

C.

Namespaces and Pod or Service labels

Question 2

You are investigating potential data exfiltration by reviewing IOAs in Falcon Cloud Security. You must check for any evidence of Defense Evasion via Impair Defenses: Disable or Modify Tools activity in your Azure environment.

Which IOA filters meet those requirements to identify any related IOAs?

Options:

A.

MITRE Tactic and Technique – Cloud provider

B.

Attack type – Cloud provider

C.

MITRE Tactic and Technique – Service

D.

Attack type – Service

Question 3

You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful, but certain CSPM operations—including asset inventories and IOM detection—are failing.

How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?

Options:

A.

Check that you have allowlisted the IP addresses provided in the public-facing CrowdStrike documentation

B.

Begin investigating another hypothesis as there is no way blocked traffic could be responsible

C.

Temporarily open up the firewall to all inbound traffic for testing purposes

Question 4

Which three image attributes can a cloud group be applied to?

Options:

A.

Image registry, Image repository, and Image tag

B.

Image cloud, Image registry, and Image repository

C.

Image type, Image tag, and Image registry

D.

Image version, Image repository, and Image tag

Question 5

What activities are carried out during the cloud inventory phase of image assessment?

Options:

A.

Expand the image layers, identify vulnerabilities, and update the image metadata

B.

Collect only the list of application packages installed on the image

C.

Expand the image layers, collect the hash for all binary objects, and list OS packages

D.

Only collect the hash for all binary objects without other assessments

Question 6

You suspect that there is malware in one of your container images.

What can you investigate to confirm this?

Options:

A.

Drift indicators

B.

Container alerts

C.

Container misconfigurations

D.

Image detection findings

Question 7

You want to deploy the Falcon sensor using 1-click sensor deployment when AWS Systems Manager is unavailable.

Which IT automation software can you use to generate an inventory of unmanaged workloads?

Options:

A.

Jet

B.

Ansible

C.

Rudder

D.

Puppet

Question 8

Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.

How can you automatically distribute the vulnerable container information from Cloud Security?

Options:

A.

Create a scheduled report to list vulnerable container data from the last 24 hours

B.

Create a scheduled report to list vulnerable container data from the last 7 days

C.

Create a query using Advanced Event Search and run the query once a week

D.

Create a dashboard displaying the vulnerable container information and share the link

Question 9

You are investigating unassessed images using Falcon Cloud Security.

What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?

Options:

A.

Image processing

B.

Assessed images

C.

Connection status

D.

Registry assessment status

Question 10

You are concerned about an overprivileged cloud identity.

What steps should you take to identify issues with the account's permissions?

Options:

A.

Go to Investigate User Search and filter for the specific identity to see any risky activity related to its permissions

B.

Go to Cloud Indicators of Misconfiguration and filter for the identity to see any risky configurations related to its permissions

C.

Go to Cloud Indicators of Attack and filter for the identity to see any risky activity related to its permissions

D.

Go to Falcon Users Roles and Permissions and filter for the identity to see any risky configurations related to its permissions

Question 11

What is needed to achieve visibility into the latest AWS IAM 1020 restricted use of AWS CloudShell with the latest CIS Foundations Benchmarks for AWS, Azure, and Google Cloud?

Options:

A.

Leverage existing IOA policy

B.

Create custom IOA policy

C.

Create custom IOM policy

D.

Leverage existing IOM policy

Question 12

What criteria can you use to create exclusions for cloud scans?

Options:

A.

Account

B.

Region

C.

Service

D.

Tag

Question 13

How can unassessed images be a security concern in your cloud environment?

Options:

A.

They are actively running in your environment but have not been checked for vulnerabilities

B.

They are actively running in your environment but do not have the Falcon Container Sensor installed

C.

They are in one of your connected image registries but have never been actively running in your environment

D.

They are in one of your connected image registries but have not been checked for vulnerabilities

Question 14

When registering in AWS, what option is recommended to increase your security posture?

Options:

A.

Real-time visibility and detection

B.

Application Security Posture Management

C.

AWS Control Center

Question 15

You need to register one AWS account as part of a deployment of Falcon Cloud Security. You decide to complete the registration process in the Falcon UI.

What will be utilized during this process if you choose the recommended method to register an individual AWS account?

Options:

A.

AWS Config

B.

A Terraform script

C.

AWS CloudFormation

D.

A Bash script

Question 16

You have misconfigurations left undone in your AWS environment. This has caused you to rely on a third party or your limited internal desktop security team that lacks cloud consciousness.

What Cloud Security Posture Management setting can you set up to help your security team save time?

Options:

A.

Automatic JSON File Export

B.

SIEM Connector

C.

Scheduled Reports

D.

Cloud posture remediation

Question 17

What are the three Image properties that can be selected when editing a Cloud Group?

Options:

A.

Tag, Name, and Registry

B.

Name, Repository, and Registry

C.

Repository, Tag, and Name

D.

Registry, Repository, and Tag

Page: 1 / 6
Total 58 questions