Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CrowdStrike Certified Cloud Specialist CCCS-203b Questions and answers with Dumpstech

Exam CCCS-203b Premium Access

View all detail and faqs for the CCCS-203b exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What can you use to specify which assets to check against IOMs and Image assessment policies while leveraging the Falcon Kubernetes Admission Controller?

Options:

A.

Pod or Service labels only

B.

Namespaces only

C.

Namespaces and Pod or Service labels

Questions # 2:

What Falcon Sensor could be used to provide security for an AWS EKS cluster running on Amazon Linux 2–based EC2 instances, including container-level visibility?

Options:

A.

Falcon Container Sensor for Linux

B.

Falcon Kubernetes Admission Controller

C.

Image Assessment at Runtime

D.

Falcon Sensor for Linux

Questions # 3:

Which are valid attributes when creating an image group?

Options:

A.

Image tags and Image name

B.

Repository and Image tags

C.

Image name and Repository

D.

Registry and Image name

Questions # 4:

Which category in the Containers dashboard can be used to identify containers that are performing activity not configured in the container image?

Options:

A.

Unidentified containers

B.

Alerts

C.

Drift indicators

D.

Container detections

Questions # 5:

How can cloud groups reduce noise and focus responsibility for users?

Options:

A.

Apply exclusions for accounts assigned to the cloud group

B.

Assign permissions to users within the group

C.

Narrow a user's scope of analysis by filtering cloud resources

Questions # 6:

Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.

How can you automatically distribute the vulnerable container information from Cloud Security?

Options:

A.

Create a scheduled report to list vulnerable container data from the last 24 hours

B.

Create a scheduled report to list vulnerable container data from the last 7 days

C.

Create a query using Advanced Event Search and run the query once a week

D.

Create a dashboard displaying the vulnerable container information and share the link

Questions # 7:

You are a cloud security analyst concerned about adversaries obtaining admin privileges in your cloud environments.

Which Cloud Identity Analyzer category should you look at first?

Options:

A.

Defense Evasion

B.

Execution

C.

Persistence

D.

Privilege Escalation

Questions # 8:

What is one purpose of the CrowdStrike Kubernetes Admission Controller?

Options:

A.

Forwards Kubernetes event logs to CrowdStrike NG SIEM

B.

Provides security visibility into EKS, AKS, and self-managed clusters

C.

Monitors and enforces security policies in any containerized environment

Questions # 9:

You no longer want to see vulnerabilities for images that are older than 90 days.

What is the most efficient way to achieve this?

Options:

A.

Use a Fusion workflow to hide the results for any images older than 90 days

B.

Delete any images in your registry that are older than 90 days

C.

Use theStop assessing images older than (number) of dayssetting

D.

Manually hide any results older than 90 days

Questions # 10:

You are investigating potential data exfiltration by reviewing IOAs in Falcon Cloud Security. You must check for any evidence of Defense Evasion via Impair Defenses: Disable or Modify Tools activity in your Azure environment.

Which IOA filters meet those requirements to identify any related IOAs?

Options:

A.

MITRE Tactic and Technique – Cloud provider

B.

Attack type – Cloud provider

C.

MITRE Tactic and Technique – Service

D.

Attack type – Service

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions