Q: 1
In the context of using CrowdStrike Cloud Infrastructure Entitlement Manager (CIEM) to manage
identity security, which action should you take to identify inactive users across your cloud environment?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
During a container security audit, a security team finds that multiple Kubernetes pods are publicly
accessible from the internet due to a misconfigured ingress rule. Which of the following actions should
the team take first to mitigate the risk?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
In the context of Falcon Cloud Security, what is the primary difference between managed/unmanaged
items (e.g., accounts or containers) and assessed/unassessed items (e.g., container images)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
CrowdStrike Falcon Cloud Security offers Zero Trust assessment capabilities to evaluate cloud workloads
and enforce security policies. Which of the following best describes how Falcon Cloud Security helps
organizations implement a Zero Trust model?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
In Falcon Cloud Security, how is the distinction between assessed and unassessed items most accurately
explained?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
64/192
You are tasked with assigning policies in a cloud environment using CrowdStrike's Identity Analyzer.
Which of the following configurations aligns best with the principle of least privilege?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
When configuring a cloud account using APIs in CrowdStrike, which of the following is the correct first
step to ensure the account is successfully registered and operational in the CrowdStrike Falcon platform?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
What is the most effective action to take when a CIEM tool identifies an Azure Service Principal with
overly permissive roles and no recent usage?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
A company wants to create a Falcon Sensor policy to enforce strict monitoring on critical servers. What is
an essential configuration step for the policy?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
A security analyst using CrowdStrike Falcon Cloud Workload Protection (CWP) notices unusual
outbound traffic from a Kubernetes pod to an unknown external IP. The analyst needs to determine
whether the traffic is malicious and identify the process responsible for the connection. Which
CrowdStrike Falcon feature should the analyst use to identify network connections at the process level?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2