New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CrowdStrike CCCS CCCS-203b Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

You have 26 public-facing container images with an ExPRT rating of High and an Easily Accessible Exploited Status. Your internal process for patching vulnerable containers requires weeks per image.

How should you prioritize which vulnerabilities to fix first?

Options:

A.

Patch the vulnerabilities with the oldest CVE ID first


B.

Prioritize remediation based off of CVSS scores


C.

Take the business offline until all images are patched


D.

Filter by container running status


Expert Solution
Questions # 2:

What is a primary benefit of using CrowdStrike's suite of cloud security products?

Options:

A.

Hunts for suspicious security control plane updates


B.

Provides a comprehensive security posture by integrating visibility and prevention


C.

Monitors file integrity and data loss prevention


D.

Provides a dedicated team to remediate cloud incidents


Expert Solution
Questions # 3:

What criteria can you use to create exclusions for cloud scans?

Options:

A.

Account


B.

Region


C.

Service


D.

Tag


Expert Solution
Questions # 4:

The internal audit team is preparing for an internal review. You have been asked to provide a list of configuration policy breaches against the NIST benchmark.

Where can you access this list?

Options:

A.

Export Cloud Posture – Cloud indicators of attack


B.

Export Cloud Posture – Indicators of misconfiguration


C.

Export Cloud Posture – Remediation status


D.

Export Cloud Posture – Cloud Posture dashboard


Expert Solution
Questions # 5:

What is needed to achieve visibility into the latest AWS IAM 1020 restricted use of AWS CloudShell with the latest CIS Foundations Benchmarks for AWS, Azure, and Google Cloud?

Options:

A.

Leverage existing IOA policy


B.

Create custom IOA policy


C.

Create custom IOM policy


D.

Leverage existing IOM policy


Expert Solution
Questions # 6:

You need to register one AWS account as part of a deployment of Falcon Cloud Security. You decide to complete the registration process in the Falcon UI.

What will be utilized during this process if you choose the recommended method to register an individual AWS account?

Options:

A.

AWS Config


B.

A Terraform script


C.

AWS CloudFormation


D.

A Bash script


Expert Solution
Questions # 7:

You suspect that there is malware in one of your container images.

What can you investigate to confirm this?

Options:

A.

Drift indicators


B.

Container alerts


C.

Container misconfigurations


D.

Image detection findings


Expert Solution
Questions # 8:

Your company uses more than one cloud for cost optimization to avoid being locked in to one vendor. It saves the company money but adds complexity and visibility issues for your team.

Where can you find all of your compute assets that are managed and unmanaged by CrowdStrike across all supported cloud providers?

Options:

A.

Image Assessment Dashboard


B.

Compliance Dashboard


C.

Application Security Posture Inventory


D.

Cloud Asset Inventory


Expert Solution
Questions # 9:

When registering in AWS, what option is recommended to increase your security posture?

Options:

A.

Real-time visibility and detection


B.

Application Security Posture Management


C.

AWS Control Center


Expert Solution
Questions # 10:

CrowdStrike pulls data via API from AWS, Azure, and GCP without an agent to identify misconfigurations.

What is the default scan interval set to for each cloud provider?

Options:

A.

Every 24 hours


B.

Every 2 hours


C.

Every 4 hours


D.

Every 6 hours


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions