CCCS-203b CrowdStrike Certified Cloud Specialist Questions and Answers
You are concerned about an overprivileged cloud identity.
What steps should you take to identify issues with the account's permissions?
You have 26 public-facing container images with an ExPRT rating of High and an Easily Accessible Exploited Status. Your internal process for patching vulnerable containers requires weeks per image.
How should you prioritize which vulnerabilities to fix first?
Your team wants to review container vulnerabilities on a weekly basis. Not all members of the team reviewing the information will have access to the Falcon console.
How can you automatically distribute the vulnerable container information from Cloud Security?
You are setting up a Falcon Fusion SOAR workflow to notify your team when any new executable is downloaded to a container and run. You are using a Kubernetes and containers trigger.
Which trigger subcategory and type should you select for this purpose?
What is the first step you should take when troubleshooting issues with cloud account registrations?
When registering in AWS, what option is recommended to increase your security posture?
What activities are carried out during the cloud inventory phase of image assessment?
You are a cloud security analyst concerned about adversaries obtaining admin privileges in your cloud environments.
Which Cloud Identity Analyzer category should you look at first?
You are troubleshooting an issue with an Azure account registered in Falcon Cloud Security. The registration appeared to be successful, but certain CSPM operations—including asset inventories and IOM detection—are failing.
How can you securely test the hypothesis that these failed CSPM operations are related to your firewall configuration?
The internal audit team is preparing for an internal review. You have been asked to provide a list of configuration policy breaches against the NIST benchmark.
Where can you access this list?
You are investigating potential data exfiltration by reviewing IOAs in Falcon Cloud Security. You must check for any evidence of Defense Evasion via Impair Defenses: Disable or Modify Tools activity in your Azure environment.
Which IOA filters meet those requirements to identify any related IOAs?
What Falcon Sensor could be used to provide security for an AWS EKS cluster running on Amazon Linux 2–based EC2 instances, including container-level visibility?
You are investigating IOAs found in your cloud environment after a security breach. You must find any IOAs signifying that the threat actor has used techniques to maintain access to your cloud resources.
What filter on the IOA dashboard can you use to only view these specific IOAs?