New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CCCS-203b Questions and Answers

Question # 6

You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful but certain CSPM operations, including asset inventories and IOM detection, are failing.

How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?

A.

Check that you have allowlisted the IP addresses provided in the public-facing CrowdStrike documentation

B.

Begin investigating another hypothesis as there is no way blocked traffic could be responsible

C.

Temporarily open up the firewall to all inbound traffic for testing purposes

Full Access
Question # 7

Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?

A.

Kubernetes and containers > Image assessment > Vulnerabilities

B.

Kubernetes and containers > Container detections > Vulnerabilities

C.

Vulnerabilities user action > Host

D.

Vulnerabilities user action > Vulnerabilities

Full Access
Question # 8

You are a cloud security analyst concerned about adversaries obtaining admin privileges in your cloud environments.

Which Cloud Identity Analyzer category should you look at first?

A.

Defense Evasion

B.

Execution

C.

Persistence

D.

Privilege Escalation

Full Access
Question # 9

You are setting up a Falcon Fusion SOAR workflow to notify your team when any new executable is downloaded to a container and run. You are using a Kubernetes and containers trigger.

Which trigger subcategory and type should you select for this purpose?

A.

Image Assessment > Detection

B.

Image Assessment > Vulnerabilities

C.

Container detection > Container runtime detection

D.

Container detection > Container drift detection

Full Access
Question # 10

How can cloud groups reduce noise and focus responsibility for users?

A.

Apply exclusions for accounts assigned to the cloud group

B.

Assign permissions to users within the group

C.

Narrow a user's scope of analysis by filtering cloud resources

Full Access
Question # 11

You are concerned about an overprivileged cloud identity.

What steps should you take to identify issues with the account's permissions?

A.

Go to Investigate User Search and filter for the specific identity to see any risky activity related to its permissions

B.

Go to Cloud Indicators of Misconfiguration and filter for the identity to see any risky configurations related to its permissions

C.

Go to Cloud Indicators of Attack and filter for the identity to see any risky activity related to its permissions

D.

Go to Falcon Users Roles and Permissions and filter for the identity to see any risky configurations related to its permissions

Full Access
Question # 12

You are investigating potential data exfiltration by reviewing IOAs in Falcon Cloud Security. You must check for any evidence of Defense Evasion via Impair Defenses: Disable or Modify Tools activity in your Azure environment.

Which IOA filters meet those requirements to identify any related IOAs?

A.

MITRE Tactic and Technique – Cloud provider

B.

Attack type – Cloud provider

C.

MITRE Tactic and Technique – Service

D.

Attack type – Service

Full Access
Question # 13

What is one purpose of the CrowdStrike Kubernetes Admission Controller?

A.

Forwards Kubernetes event logs to CrowdStrike NG SIEM

B.

Provides security visibility into EKS, AKS, and self-managed clusters

C.

Monitors and enforces security policies in any containerized environment

Full Access
Question # 14

When should you enable Drift Prevention for containers?

A.

When containers are used for development and testing

B.

When images launch and need to download and install packages

C.

When your workloads have been designed to be immutable

D.

When deploying a brand new image

Full Access
Question # 15

Which category in the Containers dashboard can be used to identify containers that are performing activity not configured in the container image?

A.

Unidentified containers

B.

Alerts

C.

Drift indicators

D.

Container detections

Full Access
Question # 16

Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.

How can you automatically distribute the vulnerable container information from Cloud Security?

A.

Create a scheduled report to list vulnerable container data from the last 24 hours

B.

Create a scheduled report to list vulnerable container data from the last 7 days

C.

Create a query using Advanced Event Search and run the query once a week

D.

Create a dashboard displaying the vulnerable container information and share the link

Full Access
Question # 17

In which environment condition does CrowdStrike recommend starting with Phase 1: Initial deployment rather than moving directly to Phase 2: Interim protection?

A.

Hosts in multiple clouds

B.

Pre-existing HIPS suites

C.

Highly ephemeral workloads

D.

No internet connectivity

Full Access