New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CrowdStrike CCCS CCCS-203b Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

You are a cloud security analyst concerned about adversaries obtaining admin privileges in your cloud environments.

Which Cloud Identity Analyzer category should you look at first?

Options:

A.

Defense Evasion


B.

Execution


C.

Persistence


D.

Privilege Escalation


Expert Solution
Questions # 12:

You are investigating unassessed images using Falcon Cloud Security.

What widget displays current totals of assessed and unassessed images in the Registry connections section under Image assessment settings?

Options:

A.

Image processing


B.

Assessed images


C.

Connection status


D.

Registry assessment status


Expert Solution
Questions # 13:

You no longer want to see vulnerabilities for images that are older than 90 days.

What is the most efficient way to achieve this?

Options:

A.

Use a Fusion workflow to hide the results for any images older than 90 days


B.

Delete any images in your registry that are older than 90 days


C.

Use theStop assessing images older than (number) of dayssetting


D.

Manually hide any results older than 90 days


Expert Solution
Questions # 14:

You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful but certain CSPM operations, including asset inventories and IOM detection, are failing.

How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?

Options:

A.

Check that you have allowlisted the IP addresses provided in the public-facing CrowdStrike documentation


B.

Begin investigating another hypothesis as there is no way blocked traffic could be responsible


C.

Temporarily open up the firewall to all inbound traffic for testing purposes


Expert Solution
Questions # 15:

What is required to ensure you can retrieve the Falcon KAC image when deploying the Falcon Kubernetes Admission Controller (KAC) with a Helm chart?

Options:

A.

SENSOR_PLATFORM


B.

FALCON_REGION


C.

Docker


D.

API client key


Expert Solution
Questions # 16:

Where can you check the current status of accounts and identify deployment misconfigurations?

Options:

A.

Cloud security – Settings – Automate


B.

Cloud security – Policies – Cloud security posture


C.

Cloud security – Settings – Account registration


D.

Cloud security – Settings – Cloud posture scan settings


Expert Solution
Questions # 17:

Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?

Options:

A.

Kubernetes and containers > Image assessment > Vulnerabilities


B.

Kubernetes and containers > Container detections > Vulnerabilities


C.

Vulnerabilities user action > Host


D.

Vulnerabilities user action > Vulnerabilities


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions