New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CrowdStrike IDP - CrowdStrike Certified Identity Specialist(CCIS) Exam

Page: 2 / 2
Total 58 questions

By using compromised credentials, threat actors are able to bypass theExecutionphase of the MITRE ATT&CK framework and move directly into:

A.

Initial Access

B.

Weaponization

C.

Discovery

D.

Lateral Movement

To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:

A.

Page

B.

Push

C.

Pull

D.

Alarm

Which of the following IDaaS connectors will allow Identity to ingest cloud activity along with applying SSO Policy?

A.

ADFS

B.

Okta SSO

C.

Azure NPS

D.

SAML

When creating an API key, which scope should be selected to retrieve Identity Protection detection and incident information?

A.

Identity Protection Detections

B.

Identity Protection Incidents

C.

Identity Protection Assessment

D.

Identity Protection Data

How long does it typically take Falcon Identity to develop a baseline of a user?

A.

One month

B.

Three months

C.

One week

D.

Two weeks

What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?

A.

New endpoint detection

B.

New incident

C.

Alert > Identity detection

D.

Spotlight user action > Host

Which of the following actions willNOThelp to decrease a domain risk score?

A.

Upgrading endpoints running end-of-life operating systems

B.

Upgrading endpoints running end-of-life Acrobat Reader

C.

Enabling SMB Signing within Active Directory

D.

Enforcing NTLMv2 responses