Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CrowdStrike IDP Dumps Questions Answers

Page: 1 / 4
Total 58 questions

CrowdStrike Certified Identity Specialist(CCIS) Exam Questions and Answers

Question 1

The Enforce section of Identity Protection is used to:

Options:

A.

Configure domains, appliances, subnets, connectors, risk configuration, and settings

B.

Define policy rules that determine what actions to take in response to certain triggers observed in the environment

C.

View all identity-based detections and identity-based incidents in the environment

D.

Gain an overview of the domain and indicate whether the domain follows best security practice

Buy Now
Question 2

Which CrowdStrike documentation category would you search to find GraphQL examples?

Options:

A.

CrowdStrike APIs

B.

Threat Intelligence

C.

XDR

D.

Identity Protection APIs

Question 3

Which of the following MFA providers areNOTsupported by Falcon Identity?

Options:

A.

Firebase

B.

Azure (Entra) MFA

C.

Symantec VIP

D.

DUO

Question 4

By using compromised credentials, threat actors are able to bypass theExecutionphase of the MITRE ATT&CK framework and move directly into:

Options:

A.

Initial Access

B.

Weaponization

C.

Discovery

D.

Lateral Movement

Question 5

Where would a Falcon administrator enable authentication traffic inspection (ATI) for Domain Controllers?

Options:

A.

Identity configuration policies

B.

Identity management settings

C.

Identity detection configuration

D.

Identity protection settings

Question 6

Which of the following would cause an identity-based incident type to change?

Options:

A.

An exclusion added to the incident

B.

A user linked detections to the incident in the console

C.

A user changed the incident type in the console

D.

Detections related to the incident

Question 7

How does the Falcon sensor for Windows contribute to the enforcement in Falcon Identity Protection?

Options:

A.

Enforces strict password complexity rules for user accounts

B.

Encrypts network traffic to ensure secure communication

C.

Manages user access and permissions on domain controllers

D.

Collects and validates domain authentication events

Question 8

Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?

Options:

A.

Falcon Fusion is not identity based

B.

Falcon Fusion will only work with certain users

C.

Falcon Fusion will only send emails to the user

D.

Falcon Fusion works with your IT policy enforcement through the use of identity and behavioral analytics

Question 9

To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:

Options:

A.

Page

B.

Push

C.

Pull

D.

Alarm

Question 10

What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?

Options:

A.

New endpoint detection

B.

New incident

C.

Alert > Identity detection

D.

Spotlight user action > Host

Question 11

When an endpoint that has not been used in the last90 daysbecomes active, a detection forUse of Stale Endpointis reported.

Options:

A.

180 days

B.

90 days

C.

30 days

D.

60 days

Question 12

The events are excluded by default while Low, Medium, and High detections are visible.

Options:

A.

Informational

B.

Indiscrete

C.

Internal

D.

Inferior

Question 13

Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?

Options:

A.

Machine-learning-powered detection rules

B.

API-based connectors

C.

Ingesting logs

D.

The need for string-based queries

Question 14

The configuration of the Azure AD (Entra ID) Identity-as-a-Service connector requires which three pieces of information?

Options:

A.

Tenant Domain, Token, Configuration File

B.

Tenant Domain, Client Secret, User Identifier

C.

Tenant Domain, Application ID, Scope

D.

Tenant Domain, Application ID, Application Secret

Question 15

The NIST SP 800-207 framework for Zero Trust Architecture defines validation and authentication standards for users in which network locations?

Options:

A.

Only those users inside the network

B.

Only those users accessing the network remotely over VPN

C.

All users both inside and outside of the network

D.

Only those users outside the network

Question 16

Within Domain Security Overview, whatGoalincorporates all risks into one security assessment report?

Options:

A.

Pen Testing

B.

AD Hygiene

C.

Reduce Attack Surface

D.

Privileged User Management

Question 17

Under which CrowdStrike documentation category could you find Identity Protection API information?

Options:

A.

Tools and Reference

B.

Falcon Management

C.

CrowdStrike Store

D.

CrowdStrike APIs

Page: 1 / 4
Total 58 questions