Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CrowdStrike CCCS-203b Dumps Questions Answers

Page: 1 / 4
Total 58 questions

CrowdStrike Certified Cloud Specialist Questions and Answers

Question 1

What are the three Image properties that can be selected when editing a Cloud Group?

Options:

A.

Tag, Name, and Registry

B.

Name, Repository, and Registry

C.

Repository, Tag, and Name

D.

Registry, Repository, and Tag

Buy Now
Question 2

What Falcon Sensor could be used to provide security for an AWS EKS cluster running on Amazon Linux 2–based EC2 instances, including container-level visibility?

Options:

A.

Falcon Container Sensor for Linux

B.

Falcon Kubernetes Admission Controller

C.

Image Assessment at Runtime

D.

Falcon Sensor for Linux

Question 3

You are a cloud security analyst concerned about adversaries obtaining admin privileges in your cloud environments.

Which Cloud Identity Analyzer category should you look at first?

Options:

A.

Defense Evasion

B.

Execution

C.

Persistence

D.

Privilege Escalation

Question 4

Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?

Options:

A.

Kubernetes and containers > Image assessment > Vulnerabilities

B.

Kubernetes and containers > Container detections > Vulnerabilities

C.

Vulnerabilities user action > Host

D.

Vulnerabilities user action > Vulnerabilities

Question 5

You need to register one AWS account as part of a deployment of Falcon Cloud Security. You decide to complete the registration process in the Falcon UI.

What will be utilized during this process if you choose the recommended method to register an individual AWS account?

Options:

A.

AWS Config

B.

A Terraform script

C.

AWS CloudFormation

D.

A Bash script

Question 6

You want to deploy the Falcon sensor using 1-click sensor deployment when AWS Systems Manager is unavailable.

Which IT automation software can you use to generate an inventory of unmanaged workloads?

Options:

A.

Jet

B.

Ansible

C.

Rudder

D.

Puppet

Question 7

You suspect that there is malware in one of your container images.

What can you investigate to confirm this?

Options:

A.

Drift indicators

B.

Container alerts

C.

Container misconfigurations

D.

Image detection findings

Question 8

What is the recommended method to block a specific CVE for 14 days when creating an Image assessment policy exclusion?

Options:

A.

Vulnerabilities published recently until 14 days

B.

Vulnerability ID & Exclude until 14 days

C.

Packages published recently until 14 days

D.

Vulnerable ID & Exclude indefinitely

Question 9

You are concerned about an overprivileged cloud identity.

What steps should you take to identify issues with the account's permissions?

Options:

A.

Go to Investigate User Search and filter for the specific identity to see any risky activity related to its permissions

B.

Go to Cloud Indicators of Misconfiguration and filter for the identity to see any risky configurations related to its permissions

C.

Go to Cloud Indicators of Attack and filter for the identity to see any risky activity related to its permissions

D.

Go to Falcon Users Roles and Permissions and filter for the identity to see any risky configurations related to its permissions

Question 10

There is a valid sensor update policy for all Linux hosts that is set to n-2. Some of the hosts have not updated their sensor version.

What is the reason for this situation?

Options:

A.

DaemonSet was used for deployment

B.

One-click sensor deployment has not been enabled

C.

None of the hosts have been restarted

Question 11

As a Falcon Administrator, you must add access for an analyst to review cloud control plane IOMs.

What least privilege role should you assign them?

Options:

A.

Cloud Security Manager

B.

Kubernetes and Containers Manager

C.

Cloud Compliance Viewer

D.

CSPM Misconfiguration Viewer

Question 12

What is a primary function of the Containers and Images Compliance dashboard in CrowdStrike's Cloud Security platform?

Options:

A.

Provides a visual summary of compliance across containers and images

B.

Tracks the network performance of containers and provides detailed network usage data

C.

Allows users to automatically patch non-compliant containers and images

D.

Displays the list of all containers that are unsupported by Falcon Cloud Security with Containers

Question 13

You no longer want to see vulnerabilities for images that are older than 90 days.

What is the most efficient way to achieve this?

Options:

A.

Use a Fusion workflow to hide the results for any images older than 90 days

B.

Delete any images in your registry that are older than 90 days

C.

Use theStop assessing images older than (number) of dayssetting

D.

Manually hide any results older than 90 days

Question 14

Which action is required when creating a new image registry connection that accesses a privately hosted registry?

Options:

A.

Verify the registry URL

B.

Confirm expiration date of the secret for any used service accounts

C.

Add CrowdStrike IP addresses to registry allowlists

D.

Verify the token and secret

Question 15

Which Falcon sensor installation should you use for a Kubernetes endpoint that is hosting container workloads when you have access to the kernel?

Options:

A.

Falcon Operator Container Image

B.

Falcon Container Sensor for Linux

C.

Falcon Sensor for Linux

D.

Falcon Sensor for Linux deployed as a DaemonSet

Question 16

You are setting up a Falcon Fusion SOAR workflow to notify your team when any new executable is downloaded to a container and run. You are using a Kubernetes and containers trigger.

Which trigger subcategory and type should you select for this purpose?

Options:

A.

Image Assessment > Detection

B.

Image Assessment > Vulnerabilities

C.

Container detection > Container runtime detection

D.

Container detection > Container drift detection

Question 17

You are investigating unassessed images using Falcon Cloud Security.

What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?

Options:

A.

Image processing

B.

Assessed images

C.

Connection status

D.

Registry assessment status

Page: 1 / 4
Total 58 questions