Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CrowdStrike CCIS IDP Questions and answers with Dumpstech

Exam IDP Premium Access

View all detail and faqs for the IDP exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which menu option isNOTincluded in Falcon Identity Threat Detection (ITD)?

Options:

A.

Event Analysis

B.

Settings

C.

Privileged Identities

D.

Policy Rules

Questions # 2:

Which of the following areNOTincluded within the three-dot menu on Identity-based Detections?

Question # 2

Which of the following are not included within the three-dot menu on Identity-based Detections?

Options:

A.

Edit status

B.

Add to Watchlist

C.

Add exclusion

D.

Add comment

Questions # 3:

Question # 3

Which of the followingBESTindicates that this user has an established baseline?

Options:

A.

The user was found logging into five endpoints

B.

The user has endpoints that they are considered owners of

C.

The user has a risk score of 6.4

D.

The user has recent logon activity on ETIS-WS03

Questions # 4:

Describe the difference between a Human account and a Programmatic account.

Options:

A.

A human account is an Administrator

B.

A programmatic account is never authorized for multi-factor authentication

C.

A programmatic account is only used interactively

D.

A human account is often used interactively

Questions # 5:

Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?

Options:

A.

Falcon Fusion is not identity based

B.

Falcon Fusion will only work with certain users

C.

Falcon Fusion will only send emails to the user

D.

Falcon Fusion works with your IT policy enforcement through the use of identity and behavioral analytics

Questions # 6:

Within Domain Security Overview, whatGoalincorporates all risks into one security assessment report?

Options:

A.

Pen Testing

B.

AD Hygiene

C.

Reduce Attack Surface

D.

Privileged User Management

Questions # 7:

How should a user be classified if one requires observation for potential risk to the business?

Options:

A.

Honeytoken Account

B.

High Risk

C.

Watched User

D.

Marked User

Questions # 8:

When creating an API client, which scope withWritepermissions must be enabled prior to using Identity Protection API?

Options:

A.

Identity Protection Assessment

B.

Identity Protection Health

C.

There is no need for Write permissions in order to use IDP API

D.

Identity Protection GraphQL

Questions # 9:

Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?

Options:

A.

Machine-learning-powered detection rules

B.

API-based connectors

C.

Ingesting logs

D.

The need for string-based queries

Questions # 10:

Which of the following best describes how Policy Group and Policy Rule precedence works?

Options:

A.

Policy Groups are evaluated in the order in which the groups appear on the page. The Policy Rules within those groups are evaluated in the order in which they appear in the group

B.

There is no precedence with Policy Groups or Policy Rules; they enact policy if the conditions match

C.

Policy Groups only group Policy Rules together. Precedence is dictated by the Rules

D.

Policy Groups are evaluated in the order in which the groups appear on the page; however, Policy Rules within those groups have no precedence

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions