CrowdStrike CCIS - CrowdStrike Certified Identity Specialist Exam

Question #6 (Topic: Exam A)

Given the detection exclusion shown above, which answer CORRECTLY describes how this would work regarding the “Suspicious protocol implementation (pass the hash)” detection?
A. It WILL trigger when Domain Admins attempt this activity against domain controllers, as long as the source host has a Zero Trust Assessment score of 90+ B. It will NOT trigger when Domain Admins attempt this activity against domain controllers as long as the source host has a Zero Trust Assessment score of 90+ C. It will NOT trigger when Domain Admins attempt this activity against domain controllers, as long as the domain controllers have a Zero Trust Assessment score of 90+ D. It will NOT trigger when any privileged user attempts this activity against domain controllers, as long as the source host has a Zero Trust Assessment score of 90+
Answer: B
Question #7 (Topic: Exam A)

Given information from the Falcon Identity Protection detection shown in the figure above, which of the following responses is TRUE?
A. User bbanner typically uses computer CAST-EAGLE-ADMN, but is seen logging into another computer B. User bbanner does not typically use CAST-EAGLE-ADMN, but is seen logging into this computer C. User bbanner logged into privileged computer CAST-EAGLE-ADMN, which should not be allowed D. User CAST-EAGLE-ADMN logged into computer bbanner, which is unusual
Answer: B
Question #8 (Topic: Exam A)

What needs to be added to the following Fusion Workflow in order to monitor entities related to these particular endpoint detections?
A. Add user and endpoint to marked list B. Network contain user and endpoint C. Add user and endpoint to watchlist D. Get device details and add endpoint to host group
Answer: C
Question #9 (Topic: Exam A)

Which of the following are not included within the three-dot menu on Identity-based Detections?
A. Edit status B. Add comment C. Add exclusion D. Add to Watchlist
Answer: C
Question #10 (Topic: Exam A)
The Risk Matrix shows the risks rated by two parameters, what are they?
A. Likelihood and Consequences B. Rarity and Visibility C. Exposure and Severity D. Complexity and Quantity
Answer: A
Download Exam
Page: 2 / 18
Total 89 questions