CrowdStrike CCCS-203b CrowdStrike Certified Cloud Specialist Exam Practice Test
CrowdStrike Certified Cloud Specialist Questions and Answers
How can you prevent a container process from altering the container's expected behavior?
How can you find if there are any remediable vulnerabilities in your running containers?
You are concerned about an overprivileged cloud identity.
What steps should you take to identify issues with the account's permissions?
What is the recommended method to block a specific CVE for 14 days when creating an Image assessment policy exclusion?
There is a valid sensor update policy for all Linux hosts that is set to n-2. Some of the hosts have not updated their sensor version.
What is the reason for this situation?
Which category in the Containers dashboard can be used to identify containers that are performing activity not configured in the container image?
What cloud-conscious attacker behavior is used to allow them to stay hidden in the environment?
When should you enable Drift Prevention for containers?
Your organization is deploying containerized applications in a cloud environment. You must ensure that container images are free of vulnerabilities before being deployed into production. The solution must integrate seamlessly with your CI/CD pipeline to automate image scanning during the build process.
Which image assessment method is in accordance with CrowdStrike best practices?
Where can you check the current status of accounts and identify deployment misconfigurations?
You are investigating unassessed images using Falcon Cloud Security.
What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?
You receive an alert that one of your container images contains AWS credentials stored in cleartext.
What detection type should you search for to investigate?
Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.
How can you automatically distribute the vulnerable container information from Cloud Security?
What criteria can you use to create exclusions for cloud scans?
What is required to ensure you can retrieve the Falcon KAC image when deploying the Falcon Kubernetes Admission Controller (KAC) with a Helm chart?
Your company uses more than one cloud for cost optimization to avoid being locked in to one vendor. It saves the company money but adds complexity and visibility issues for your team.
Where can you find all of your compute assets that are managed and unmanaged by CrowdStrike across all supported cloud providers?
What is one purpose of the CrowdStrike Kubernetes Admission Controller?