Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the CrowdStrike CCIS IDP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam IDP Premium Access

View all detail and faqs for the IDP exam


581 Students Passed

87% Average Score

96% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

How should an organization address the domain risk score found in the Domain Security Overview page?

Options:

A.

Address the risks on the list from top to bottom as risks are presented in a descending order

B.

Prioritizing the risks by severity, addressing the Medium (Yellow) risks first

C.

Prioritizing the detections by severity, addressing the High (Red) detections first

D.

Prioritizing the risks by severity, addressing the Low (Green) risks first

Questions # 2:

The Enforce section of Identity Protection is used to:

Options:

A.

Configure domains, appliances, subnets, connectors, risk configuration, and settings

B.

Define policy rules that determine what actions to take in response to certain triggers observed in the environment

C.

View all identity-based detections and identity-based incidents in the environment

D.

Gain an overview of the domain and indicate whether the domain follows best security practice

Questions # 3:

Describe the difference between a Human account and a Programmatic account.

Options:

A.

A human account is an Administrator

B.

A programmatic account is never authorized for multi-factor authentication

C.

A programmatic account is only used interactively

D.

A human account is often used interactively

Questions # 4:

What does a modern Zero Trust security architecture offer compared to a traditional wall-and-moat (perimeter-based firewall) approach?

Options:

A.

Applies machine learning to gauge the trustworthiness of any external entities

B.

Secures the perimeter of a network and does not allow access to any entities deemed “zero trust”

C.

Issues trust certificates to internal entities and zero trust certificates to external entities

D.

Continuously authenticates entities regardless of origin

Questions # 5:

Which of the following statements isNOTtrue as it relates to Identity Events, Detections, and Incidents?

Options:

A.

Events related to an incident that occur after the incident is marked In Progress will create a new incident

B.

A detection can become an element of an incident that preceded it in time

C.

An event can become an element of a detection that preceded it in time

D.

Not all events are security events that become elements of detections

Questions # 6:

Which CrowdStrike documentation category would you search to find GraphQL examples?

Options:

A.

CrowdStrike APIs

B.

Threat Intelligence

C.

XDR

D.

Identity Protection APIs

Questions # 7:

Under which CrowdStrike documentation category could you find Identity Protection API information?

Options:

A.

Tools and Reference

B.

Falcon Management

C.

CrowdStrike Store

D.

CrowdStrike APIs

Questions # 8:

Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?

Options:

A.

Machine-learning-powered detection rules

B.

API-based connectors

C.

Ingesting logs

D.

The need for string-based queries

Questions # 9:

Which of the following users would most likely have aHIGHrisk score?

Options:

A.

User that recently logged in from a shared endpoint

B.

Privileged user with a Compromised Password

C.

User that has not logged in recently and is marked as Stale

D.

User that is a member of the Domain Admins group

Questions # 10:

Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?

Options:

A.

Falcon Fusion is not identity based

B.

Falcon Fusion will only work with certain users

C.

Falcon Fusion will only send emails to the user

D.

Falcon Fusion works with your IT policy enforcement through the use of identity and behavioral analytics

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.