Week End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CrowdStrike IDP CrowdStrike Certified Identity Specialist(CCIS) Exam Exam Practice Test

Demo: 17 questions
Total 58 questions

CrowdStrike Certified Identity Specialist(CCIS) Exam Questions and Answers

Question 1

How does Identity Protection extend the capabilities of existing multi-factor authentication (MFA)?

Options:

A.

Implementation of a second-layer security control using policy rules as it detects risky or abnormal behaviors

B.

Identity Protection is not going to detect risky user behavior

C.

Identity Protection will replace third-party MFA and trigger as it detects risky or abnormal behaviors

D.

Identity Protection does not support on-premises MFA connectors

Question 2

Which menu option isNOTincluded in Falcon Identity Threat Detection (ITD)?

Options:

A.

Event Analysis

B.

Settings

C.

Privileged Identities

D.

Policy Rules

Question 3

To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:

Options:

A.

Page

B.

Push

C.

Pull

D.

Alarm

Question 4

How should an organization address the domain risk score found in the Domain Security Overview page?

Options:

A.

Address the risks on the list from top to bottom as risks are presented in a descending order

B.

Prioritizing the risks by severity, addressing the Medium (Yellow) risks first

C.

Prioritizing the detections by severity, addressing the High (Red) detections first

D.

Prioritizing the risks by severity, addressing the Low (Green) risks first

Question 5

The NIST SP 800-207 framework for Zero Trust Architecture defines validation and authentication standards for users in which network locations?

Options:

A.

Only those users inside the network

B.

Only those users accessing the network remotely over VPN

C.

All users both inside and outside of the network

D.

Only those users outside the network

Question 6

How does CrowdStrike Falcon Identity Protection help customers identify different types of accounts in their domain?

Options:

A.

Implements advanced encryption algorithms for account metadata

B.

Assigns a human authorizer to each programmatic account for approval

C.

Analyzes authentication traffic and automatically classifies programmatic and human accounts

D.

Conducts regular vulnerability assessments on programmatic accounts

Question 7

Where would a Falcon administrator enable authentication traffic inspection (ATI) for Domain Controllers?

Options:

A.

Identity configuration policies

B.

Identity management settings

C.

Identity detection configuration

D.

Identity protection settings

Question 8

Which of the following Falcon rolesCANNOTenable and disable policy rules?

Options:

A.

Identity Protection Domain Administrator

B.

Identity Protection Administrator

C.

Identity Protection Policy Manager

D.

Falcon Administrator

Question 9

Which of the following would cause an identity-based incident type to change?

Options:

A.

An exclusion added to the incident

B.

A user linked detections to the incident in the console

C.

A user changed the incident type in the console

D.

Detections related to the incident

Question 10

Which of the following best describes how Policy Group and Policy Rule precedence works?

Options:

A.

Policy Groups are evaluated in the order in which the groups appear on the page. The Policy Rules within those groups are evaluated in the order in which they appear in the group

B.

There is no precedence with Policy Groups or Policy Rules; they enact policy if the conditions match

C.

Policy Groups only group Policy Rules together. Precedence is dictated by the Rules

D.

Policy Groups are evaluated in the order in which the groups appear on the page; however, Policy Rules within those groups have no precedence

Question 11

Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?

Options:

A.

Falcon Fusion is not identity based

B.

Falcon Fusion will only work with certain users

C.

Falcon Fusion will only send emails to the user

D.

Falcon Fusion works with your IT policy enforcement through the use of identity and behavioral analytics

Question 12

When creating an API key, which scope should be selected to retrieve Identity Protection detection and incident information?

Options:

A.

Identity Protection Detections

B.

Identity Protection Incidents

C.

Identity Protection Assessment

D.

Identity Protection Data

Question 13

Within Domain Security Overview, whatGoalincorporates all risks into one security assessment report?

Options:

A.

Pen Testing

B.

AD Hygiene

C.

Reduce Attack Surface

D.

Privileged User Management

Question 14

Can a specific detection be excluded altogether or just per entity?

Options:

A.

Only specific entities can be excluded by using the Identity-Based Detection → Detection Exclusion page

B.

Only detections can be disabled using the Identity-Based Detection → Detection Exclusion page

C.

All detections can be disabled, some detections support excluding entities

D.

Adding an exclusion for a detection creates a security hole, therefore a detection cannot be excluded

Question 15

Which of the following isNOTan available Goal within the Domain Security Overview?

Options:

A.

Privileged Users Management

B.

Business Privileged Users Management

C.

AD Hygiene

D.

Pen Testing

Question 16

What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?

Options:

A.

New endpoint detection

B.

New incident

C.

Alert > Identity detection

D.

Spotlight user action > Host

Question 17

Which of the following actions willNOThelp to decrease a domain risk score?

Options:

A.

Upgrading endpoints running end-of-life operating systems

B.

Upgrading endpoints running end-of-life Acrobat Reader

C.

Enabling SMB Signing within Active Directory

D.

Enforcing NTLMv2 responses

Demo: 17 questions
Total 58 questions