CrowdStrike CCCS-203b - CrowdStrike Certified Cloud Specialist
Your organization is deploying containerized applications in a cloud environment. You must ensure that container images are free of vulnerabilities before being deployed into production. The solution must integrate seamlessly with your CI/CD pipeline to automate image scanning during the build process.
Which image assessment method is in accordance with CrowdStrike best practices?
Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?
What activities are carried out during the cloud inventory phase of image assessment?
What are the three Image properties that can be selected when editing a Cloud Group?
What cloud-conscious attacker behavior is used to allow them to stay hidden in the environment?
How can cloud groups reduce noise and focus responsibility for users?
You have misconfigurations left undone in your AWS environment. This has caused you to rely on a third party or your limited internal desktop security team that lacks cloud consciousness.
What Cloud Security Posture Management setting can you set up to help your security team save time?
You suspect that there is malware in one of your container images.
What can you investigate to confirm this?
What are three valid states for the state of a port under the Network Events dashboard?
How can you prevent a container process from altering the container's expected behavior?
