New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CrowdStrike > CCCS > CCCS-203b

CCCS-203b CrowdStrike Certified Cloud Specialist Question and Answers

Question # 4

You are investigating IOAs found in your cloud environment after a security breach. You must find any IOAs signifying that the threat actor has used techniques to maintain access to your cloud resources.

What filter on the IOA dashboard can you use to only view these specific IOAs?

A.

Execution

B.

Privilege Escalation

C.

Persistence

D.

Ransomware

Full Access
Question # 5

What is required to ensure you can retrieve the Falcon KAC image when deploying the Falcon Kubernetes Admission Controller (KAC) with a Helm chart?

A.

SENSOR_PLATFORM

B.

FALCON_REGION

C.

Docker

D.

API client key

Full Access
Question # 6

What is one purpose of the CrowdStrike Kubernetes Admission Controller?

A.

Forwards Kubernetes event logs to CrowdStrike NG SIEM

B.

Provides security visibility into EKS, AKS, and self-managed clusters

C.

Monitors and enforces security policies in any containerized environment

Full Access
Question # 7

Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?

A.

Kubernetes and containers > Image assessment > Vulnerabilities

B.

Kubernetes and containers > Container detections > Vulnerabilities

C.

Vulnerabilities user action > Host

D.

Vulnerabilities user action > Vulnerabilities

Full Access
Question # 8

What can you use to specify which assets to check against IOMs and Image assessment policies while leveraging the Falcon Kubernetes Admission Controller?

A.

Pod or Service labels only

B.

Namespaces only

C.

Namespaces and Pod or Service labels

Full Access
Question # 9

How can you find if there are any remediable vulnerabilities in your running containers?

A.

Filter container assets by container running status and vulnerability remediation

B.

Filter image detections by container running status and remediation

C.

Filter image vulnerabilities by container running status and remediation

D.

Filter container assets by container running status and detection remediation

Full Access
Question # 10

Which category in the Containers dashboard can be used to identify containers that are performing activity not configured in the container image?

A.

Unidentified containers

B.

Alerts

C.

Drift indicators

D.

Container detections

Full Access
Question # 11

When should you enable Drift Prevention for containers?

A.

When containers are used for development and testing

B.

When images launch and need to download and install packages

C.

When your workloads have been designed to be immutable

D.

When deploying a brand new image

Full Access
Question # 12

You are a cloud security analyst concerned about adversaries obtaining admin privileges in your cloud environments.

Which Cloud Identity Analyzer category should you look at first?

A.

Defense Evasion

B.

Execution

C.

Persistence

D.

Privilege Escalation

Full Access
Question # 13

What are the three Image properties that can be selected when editing a Cloud Group?

A.

Tag, Name, and Registry

B.

Name, Repository, and Registry

C.

Repository, Tag, and Name

D.

Registry, Repository, and Tag

Full Access
Question # 14

Your company uses more than one cloud for cost optimization to avoid being locked in to one vendor. It saves the company money but adds complexity and visibility issues for your team.

Where can you find all of your compute assets that are managed and unmanaged by CrowdStrike across all supported cloud providers?

A.

Image Assessment Dashboard

B.

Compliance Dashboard

C.

Application Security Posture Inventory

D.

Cloud Asset Inventory

Full Access
Question # 15

You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful, but certain CSPM operations—including asset inventories and IOM detection—are failing.

How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?

A.

Check that you have allowlisted the IP addresses provided in the public-facing CrowdStrike documentation

B.

Begin investigating another hypothesis as there is no way blocked traffic could be responsible

C.

Temporarily open up the firewall to all inbound traffic for testing purposes

Full Access
Question # 16

Which action is required when creating a new image registry connection that accesses a privately hosted registry?

A.

Verify the registry URL

B.

Confirm expiration date of the secret for any used service accounts

C.

Add CrowdStrike IP addresses to registry allowlists

D.

Verify the token and secret

Full Access
Question # 17

You are setting up a Falcon Fusion SOAR workflow to notify your team when any new executable is downloaded to a container and run. You are using a Kubernetes and containers trigger.

Which trigger subcategory and type should you select for this purpose?

A.

Image Assessment > Detection

B.

Image Assessment > Vulnerabilities

C.

Container detection > Container runtime detection

D.

Container detection > Container drift detection

Full Access