Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CrowdStrike IDP CrowdStrike Certified Identity Specialist(CCIS) Exam Exam Practice Test

Page: 1 / 6
Total 58 questions

CrowdStrike Certified Identity Specialist(CCIS) Exam Questions and Answers

Question 1

Within which Identity Protection menu would an administrator enableAuthentication Traffic Inspection (ATI)for a domain?

Options:

A.

Configure > Settings

B.

Enforce > Policy Rules

C.

Enforce > Policy Settings

D.

Configure > Identity Configuration Policies

Question 2

What setting can be switched under the Domain Security Overview for each Active Directory domain and/or Azure tenant?

Options:

A.

Privileged Identities

B.

Domains

C.

Goal

D.

Scope

Question 3

For false positives, the Detection details can be set to new“Actions”using:

Options:

A.

exits

B.

remediations

C.

exceptions

D.

recommendations

Question 4

Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?

Options:

A.

Falcon Fusion is not identity based

B.

Falcon Fusion will only work with certain users

C.

Falcon Fusion will only send emails to the user

D.

Falcon Fusion works with your IT policy enforcement through the use of identity and behavioral analytics

Question 5

Which of the following IDaaS connectors will allow Identity to ingest cloud activity along with applying SSO Policy?

Options:

A.

ADFS

B.

Okta SSO

C.

Azure NPS

D.

SAML

Question 6

Which of the following actions willNOThelp to decrease a domain risk score?

Options:

A.

Upgrading endpoints running end-of-life operating systems

B.

Upgrading endpoints running end-of-life Acrobat Reader

C.

Enabling SMB Signing within Active Directory

D.

Enforcing NTLMv2 responses

Question 7

When creating an API key, which scope should be selected to retrieve Identity Protection detection and incident information?

Options:

A.

Identity Protection Detections

B.

Identity Protection Incidents

C.

Identity Protection Assessment

D.

Identity Protection Data

Question 8

Which of the following isNOTan available Goal within the Domain Security Overview?

Options:

A.

Privileged Users Management

B.

Business Privileged Users Management

C.

AD Hygiene

D.

Pen Testing

Question 9

Describe the difference between a Human account and a Programmatic account.

Options:

A.

A human account is an Administrator

B.

A programmatic account is never authorized for multi-factor authentication

C.

A programmatic account is only used interactively

D.

A human account is often used interactively

Question 10

An account without a phone number, operating system, or role of CEO would typically be defined as:

Options:

A.

Programmatic

B.

Human

C.

Enterprise

D.

Corporate

Question 11

Which of the following best describes how Policy Group and Policy Rule precedence works?

Options:

A.

Policy Groups are evaluated in the order in which the groups appear on the page. The Policy Rules within those groups are evaluated in the order in which they appear in the group

B.

There is no precedence with Policy Groups or Policy Rules; they enact policy if the conditions match

C.

Policy Groups only group Policy Rules together. Precedence is dictated by the Rules

D.

Policy Groups are evaluated in the order in which the groups appear on the page; however, Policy Rules within those groups have no precedence

Question 12

Can a specific detection be excluded altogether or just per entity?

Options:

A.

Only specific entities can be excluded by using the Identity-Based Detection → Detection Exclusion page

B.

Only detections can be disabled using the Identity-Based Detection → Detection Exclusion page

C.

All detections can be disabled, some detections support excluding entities

D.

Adding an exclusion for a detection creates a security hole, therefore a detection cannot be excluded

Question 13

What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?

Options:

A.

New endpoint detection

B.

New incident

C.

Alert > Identity detection

D.

Spotlight user action > Host

Question 14

Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?

Options:

A.

Machine-learning-powered detection rules

B.

API-based connectors

C.

Ingesting logs

D.

The need for string-based queries

Question 15

Which of the following are minimum requirements for showing the Falcon Identity Verification Dialog on the end user’s machine?

Options:

A.

Internet Explorer 9 and Windows Server 2008

B.

.NET 3.5 and PowerShell 5.1

C.

Windows Vista and .NET 3.5

D.

Windows Server 2008 and PowerShell 5.1

Question 16

Which section of the Falcon menu is used to investigate the Event Analysis dashboard?

Options:

A.

Enforce

B.

Threat Hunter

C.

Explore

D.

Configure

Question 17

Which of the following Falcon rolesCANNOTenable and disable policy rules?

Options:

A.

Identity Protection Domain Administrator

B.

Identity Protection Administrator

C.

Identity Protection Policy Manager

D.

Falcon Administrator

Page: 1 / 6
Total 58 questions