Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

IDP CrowdStrike Certified Identity Specialist(CCIS) Exam is now Stable and With Pass Result | Test Your Knowledge for Free

IDP Practice Questions

CrowdStrike Certified Identity Specialist(CCIS) Exam

Last Update 1 day ago
Total Questions : 58

Dive into our fully updated and stable IDP practice test platform, featuring all the latest CCIS exam questions added this week. Our preparation tool is more than just a CrowdStrike study aid; it's a strategic advantage.

Our free CCIS practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about IDP. Use this test to pinpoint which areas you need to focus your study on.

IDP PDF

IDP PDF (Printable)
$43.75
$124.99

IDP Testing Engine

IDP PDF (Printable)
$50.75
$144.99

IDP PDF + Testing Engine

IDP PDF (Printable)
$63.7
$181.99
Question # 1

Within the Falcon Identity Protection portal, which page allows you to enable/disable Policy Rules?

Options:

A.  

Policy Enforcement

B.  

Enforce

C.  

Identity-Based Detections

D.  

Configure

Discussion 0
Question # 2

The NIST SP 800-207 framework for Zero Trust Architecture defines validation and authentication standards for users in which network locations?

Options:

A.  

Only those users inside the network

B.  

Only those users accessing the network remotely over VPN

C.  

All users both inside and outside of the network

D.  

Only those users outside the network

Discussion 0
Question # 3

What basic configuration fields are typically required for cloud Multi-Factor Authentication (MFA) connectors?

Options:

A.  

Service account user name and password

B.  

Domain controller host name and IP address

C.  

Domain Administrator user name and password

D.  

Connector application identifier and secret keys

Discussion 0
Question # 4

To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:

Options:

A.  

Page

B.  

Push

C.  

Pull

D.  

Alarm

Discussion 0
Question # 5

The Enforce section of Identity Protection is used to:

Options:

A.  

Configure domains, appliances, subnets, connectors, risk configuration, and settings

B.  

Define policy rules that determine what actions to take in response to certain triggers observed in the environment

C.  

View all identity-based detections and identity-based incidents in the environment

D.  

Gain an overview of the domain and indicate whether the domain follows best security practice

Discussion 0
Question # 6

Which CrowdStrike documentation category would you search to find GraphQL examples?

Options:

A.  

CrowdStrike APIs

B.  

Threat Intelligence

C.  

XDR

D.  

Identity Protection APIs

Discussion 0
Question # 7

Falcon Identity Protection monitors network traffic to build user behavioral profiles to help identify unusual user behavior. How can this be beneficial to create a Falcon Fusion workflow?

Options:

A.  

Falcon Fusion is not identity based

B.  

Falcon Fusion will only work with certain users

C.  

Falcon Fusion will only send emails to the user

D.  

Falcon Fusion works with your IT policy enforcement through the use of identity and behavioral analytics

Discussion 0
Question # 8

Under which CrowdStrike documentation category could you find Identity Protection API information?

Options:

A.  

Tools and Reference

B.  

Falcon Management

C.  

CrowdStrike Store

D.  

CrowdStrike APIs

Discussion 0
Question # 9

Which section of the Falcon menu is used to investigate the Event Analysis dashboard?

Options:

A.  

Enforce

B.  

Threat Hunter

C.  

Explore

D.  

Configure

Discussion 0
Question # 10

The CISO of your organization recently read a report about the increased usage of identity brokers and is interested in finding a solution for the company. Which of the following makes Falcon Identity a valid solution for the organization?

Options:

A.  

Provides the ability to audit and record sessions across multiple methods, such as SSH, RDP, and SMB

B.  

Falcon Identity is able to be a middleware between Active Directory and a Human Resource Information System (HRIS)

C.  

Gives the organization the ability to proactively mitigate risks, as well as protect critical Active Directory infrastructure through Policy Rules

D.  

Allows administrators to store and delegate passwords to application servers

Discussion 0
Get IDP dumps and pass your exam in 24 hours!

Free Exams Sample Questions