New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CrowdStrike CCCS-203b - CrowdStrike Certified Cloud Specialist

Page: 1 / 2
Total 58 questions

Your organization is deploying containerized applications in a cloud environment. You must ensure that container images are free of vulnerabilities before being deployed into production. The solution must integrate seamlessly with your CI/CD pipeline to automate image scanning during the build process.

Which image assessment method is in accordance with CrowdStrike best practices?

A.

Wait until the images are running in production and rely on host-based security tools to monitor threats

B.

Integrate pushing images for assessment into your CI/CD pipeline to detect vulnerabilities during the build process

C.

Perform runtime analysis of the containers after they are deployed into production

D.

Manually inspect each container image in the repository for vulnerabilities before deployment

Which Fusion workflow trigger can be used to take an action when a vulnerability is found on one of your container images?

A.

Kubernetes and containers > Image assessment > Vulnerabilities

B.

Kubernetes and containers > Container detections > Vulnerabilities

C.

Vulnerabilities user action > Host

D.

Vulnerabilities user action > Vulnerabilities

What activities are carried out during the cloud inventory phase of image assessment?

A.

Expand the image layers, identify vulnerabilities, and update the image metadata

B.

Collect only the list of application packages installed on the image

C.

Expand the image layers, collect the hash for all binary objects, and list OS packages

D.

Only collect the hash for all binary objects without other assessments

What are the three Image properties that can be selected when editing a Cloud Group?

A.

Tag, Name, and Registry

B.

Name, Repository, and Registry

C.

Repository, Tag, and Name

D.

Registry, Repository, and Tag

What cloud-conscious attacker behavior is used to allow them to stay hidden in the environment?

A.

Storage Account Networking changed to All Networks

B.

CloudTrail logging disabled

C.

Certificate added to an application registration

D.

EC2 Default security group does not block all traffic

How can cloud groups reduce noise and focus responsibility for users?

A.

Apply exclusions for accounts assigned to the cloud group

B.

Assign permissions to users within the group

C.

Narrow a user's scope of analysis by filtering cloud resources

You have misconfigurations left undone in your AWS environment. This has caused you to rely on a third party or your limited internal desktop security team that lacks cloud consciousness.

What Cloud Security Posture Management setting can you set up to help your security team save time?

A.

Automatic JSON File Export

B.

SIEM Connector

C.

Scheduled Reports

D.

Cloud posture remediation

You suspect that there is malware in one of your container images.

What can you investigate to confirm this?

A.

Drift indicators

B.

Container alerts

C.

Container misconfigurations

D.

Image detection findings

What are three valid states for the state of a port under the Network Events dashboard?

A.

Open, Connect, and Closed

B.

Listen, Reject, and Connect

C.

Connect, Accept, and Listen

D.

Accept, Connect, and Reject

How can you prevent a container process from altering the container's expected behavior?

A.

Enable container drift prevention on the Linux sensor

B.

Create a custom IOA with automated remediation

C.

Enable process modification protection on the Kubernetes Admission Controller

D.

Create an Image Assessment policy to block container drift