New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CrowdStrike IDP - CrowdStrike Certified Identity Specialist(CCIS) Exam

Page: 1 / 2
Total 58 questions

How does Identity Protection extend the capabilities of existing multi-factor authentication (MFA)?

A.

Implementation of a second-layer security control using policy rules as it detects risky or abnormal behaviors

B.

Identity Protection is not going to detect risky user behavior

C.

Identity Protection will replace third-party MFA and trigger as it detects risky or abnormal behaviors

D.

Identity Protection does not support on-premises MFA connectors

For false positives, the Detection details can be set to new“Actions”using:

A.

exits

B.

remediations

C.

exceptions

D.

recommendations

Which of the following isNOTan available Goal within the Domain Security Overview?

A.

Privileged Users Management

B.

Business Privileged Users Management

C.

AD Hygiene

D.

Pen Testing

Which of the followingBESTindicates that this user has an established baseline?

A.

The user was found logging into five endpoints

B.

The user has endpoints that they are considered owners of

C.

The user has a risk score of 6.4

D.

The user has recent logon activity on ETIS-WS03

How does CrowdStrike Falcon Identity Protection help customers identify different types of accounts in their domain?

A.

Implements advanced encryption algorithms for account metadata

B.

Assigns a human authorizer to each programmatic account for approval

C.

Analyzes authentication traffic and automatically classifies programmatic and human accounts

D.

Conducts regular vulnerability assessments on programmatic accounts

Which of the following are minimum requirements for showing the Falcon Identity Verification Dialog on the end user’s machine?

A.

Internet Explorer 9 and Windows Server 2008

B.

.NET 3.5 and PowerShell 5.1

C.

Windows Vista and .NET 3.5

D.

Windows Server 2008 and PowerShell 5.1

What basic configuration fields are typically required for cloud Multi-Factor Authentication (MFA) connectors?

A.

Service account user name and password

B.

Domain controller host name and IP address

C.

Domain Administrator user name and password

D.

Connector application identifier and secret keys

Which of the following statements isNOTtrue as it relates to Identity Events, Detections, and Incidents?

A.

Events related to an incident that occur after the incident is marked In Progress will create a new incident

B.

A detection can become an element of an incident that preceded it in time

C.

An event can become an element of a detection that preceded it in time

D.

Not all events are security events that become elements of detections

Which of the following MFA providers areNOTsupported by Falcon Identity?

A.

Firebase

B.

Azure (Entra) MFA

C.

Symantec VIP

D.

DUO

Which menu option isNOTincluded in Falcon Identity Threat Detection (ITD)?

A.

Event Analysis

B.

Settings

C.

Privileged Identities

D.

Policy Rules