Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CrowdStrike CCCS-203b CrowdStrike Certified Cloud Specialist Exam Practice Test

Page: 1 / 6
Total 58 questions

CrowdStrike Certified Cloud Specialist Questions and Answers

Question 1

How can you prevent a container process from altering the container's expected behavior?

Options:

A.

Enable container drift prevention on the Linux sensor

B.

Create a custom IOA with automated remediation

C.

Enable process modification protection on the Kubernetes Admission Controller

D.

Create an Image Assessment policy to block container drift

Question 2

How can you find if there are any remediable vulnerabilities in your running containers?

Options:

A.

Filter container assets by container running status and vulnerability remediation

B.

Filter image detections by container running status and remediation

C.

Filter image vulnerabilities by container running status and remediation

D.

Filter container assets by container running status and detection remediation

Question 3

You are concerned about an overprivileged cloud identity.

What steps should you take to identify issues with the account's permissions?

Options:

A.

Go to Investigate User Search and filter for the specific identity to see any risky activity related to its permissions

B.

Go to Cloud Indicators of Misconfiguration and filter for the identity to see any risky configurations related to its permissions

C.

Go to Cloud Indicators of Attack and filter for the identity to see any risky activity related to its permissions

D.

Go to Falcon Users Roles and Permissions and filter for the identity to see any risky configurations related to its permissions

Question 4

What is the recommended method to block a specific CVE for 14 days when creating an Image assessment policy exclusion?

Options:

A.

Vulnerabilities published recently until 14 days

B.

Vulnerability ID & Exclude until 14 days

C.

Packages published recently until 14 days

D.

Vulnerable ID & Exclude indefinitely

Question 5

There is a valid sensor update policy for all Linux hosts that is set to n-2. Some of the hosts have not updated their sensor version.

What is the reason for this situation?

Options:

A.

DaemonSet was used for deployment

B.

One-click sensor deployment has not been enabled

C.

None of the hosts have been restarted

Question 6

Which category in the Containers dashboard can be used to identify containers that are performing activity not configured in the container image?

Options:

A.

Unidentified containers

B.

Alerts

C.

Drift indicators

D.

Container detections

Question 7

What cloud-conscious attacker behavior is used to allow them to stay hidden in the environment?

Options:

A.

Storage Account Networking changed to All Networks

B.

CloudTrail logging disabled

C.

Certificate added to an application registration

D.

EC2 Default security group does not block all traffic

Question 8

When should you enable Drift Prevention for containers?

Options:

A.

When containers are used for development and testing

B.

When images launch and need to download and install packages

C.

When your workloads have been designed to be immutable

D.

When deploying a brand new image

Question 9

Your organization is deploying containerized applications in a cloud environment. You must ensure that container images are free of vulnerabilities before being deployed into production. The solution must integrate seamlessly with your CI/CD pipeline to automate image scanning during the build process.

Which image assessment method is in accordance with CrowdStrike best practices?

Options:

A.

Wait until the images are running in production and rely on host-based security tools to monitor threats

B.

Integrate pushing images for assessment into your CI/CD pipeline to detect vulnerabilities during the build process

C.

Perform runtime analysis of the containers after they are deployed into production

D.

Manually inspect each container image in the repository for vulnerabilities before deployment

Question 10

Where can you check the current status of accounts and identify deployment misconfigurations?

Options:

A.

Cloud security – Settings – Automate

B.

Cloud security – Policies – Cloud security posture

C.

Cloud security – Settings – Account registration

D.

Cloud security – Settings – Cloud posture scan settings

Question 11

You are investigating unassessed images using Falcon Cloud Security.

What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?

Options:

A.

Image processing

B.

Assessed images

C.

Connection status

D.

Registry assessment status

Question 12

You receive an alert that one of your container images contains AWS credentials stored in cleartext.

What detection type should you search for to investigate?

Options:

A.

Suspicious file

B.

Misconfiguration

C.

Exposed credential

D.

Secret

Question 13

Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.

How can you automatically distribute the vulnerable container information from Cloud Security?

Options:

A.

Create a scheduled report to list vulnerable container data from the last 24 hours

B.

Create a scheduled report to list vulnerable container data from the last 7 days

C.

Create a query using Advanced Event Search and run the query once a week

D.

Create a dashboard displaying the vulnerable container information and share the link

Question 14

What criteria can you use to create exclusions for cloud scans?

Options:

A.

Account

B.

Region

C.

Service

D.

Tag

Question 15

What is required to ensure you can retrieve the Falcon KAC image when deploying the Falcon Kubernetes Admission Controller (KAC) with a Helm chart?

Options:

A.

SENSOR_PLATFORM

B.

FALCON_REGION

C.

Docker

D.

API client key

Question 16

Your company uses more than one cloud for cost optimization to avoid being locked in to one vendor. It saves the company money but adds complexity and visibility issues for your team.

Where can you find all of your compute assets that are managed and unmanaged by CrowdStrike across all supported cloud providers?

Options:

A.

Image Assessment Dashboard

B.

Compliance Dashboard

C.

Application Security Posture Inventory

D.

Cloud Asset Inventory

Question 17

What is one purpose of the CrowdStrike Kubernetes Admission Controller?

Options:

A.

Forwards Kubernetes event logs to CrowdStrike NG SIEM

B.

Provides security visibility into EKS, AKS, and self-managed clusters

C.

Monitors and enforces security policies in any containerized environment

Page: 1 / 6
Total 58 questions