Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

IDP CrowdStrike Certified Identity Specialist(CCIS) Exam Free Practice Exam Questions (2026 Updated)

Prepare effectively for your CrowdStrike IDP CrowdStrike Certified Identity Specialist(CCIS) Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 58 questions

How does the Falcon sensor for Windows contribute to the enforcement in Falcon Identity Protection?

A.

Enforces strict password complexity rules for user accounts

B.

Encrypts network traffic to ensure secure communication

C.

Manages user access and permissions on domain controllers

D.

Collects and validates domain authentication events

How long does it typically take Falcon Identity to develop a baseline of a user?

A.

One month

B.

Three months

C.

One week

D.

Two weeks

To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:

A.

Page

B.

Push

C.

Pull

D.

Alarm

When creating an API key, which scope should be selected to retrieve Identity Protection detection and incident information?

A.

Identity Protection Detections

B.

Identity Protection Incidents

C.

Identity Protection Assessment

D.

Identity Protection Data

How many days will an identity-based incident be suppressed if new events related to the same incident occur?

A.

30 days

B.

7 days

C.

14 days

D.

5 days

Which entity tab will show an administrator how to lower the account's risk score?

A.

Timeline

B.

Activity

C.

Asset

D.

Risk

Which of the following isNOTan available Goal within the Domain Security Overview?

A.

Privileged Users Management

B.

Business Privileged Users Management

C.

AD Hygiene

D.

Pen Testing

Which of the following users would most likely have aHIGHrisk score?

A.

User that recently logged in from a shared endpoint

B.

Privileged user with a Compromised Password

C.

User that has not logged in recently and is marked as Stale

D.

User that is a member of the Domain Admins group

Considering the following example, what MITRE ATT&CK tactic would you use to complete the workflow?

A.

Initial Access

B.

Credential Access

C.

Lateral Movement

D.

Privilege Escalation

What setting can be switched under the Domain Security Overview for each Active Directory domain and/or Azure tenant?

A.

Privileged Identities

B.

Domains

C.

Goal

D.

Scope

Which of the following are minimum requirements for showing the Falcon Identity Verification Dialog on the end user’s machine?

A.

Internet Explorer 9 and Windows Server 2008

B.

.NET 3.5 and PowerShell 5.1

C.

Windows Vista and .NET 3.5

D.

Windows Server 2008 and PowerShell 5.1

The events are excluded by default while Low, Medium, and High detections are visible.

A.

Informational

B.

Indiscrete

C.

Internal

D.

Inferior

The NIST SP 800-207 framework for Zero Trust Architecture defines validation and authentication standards for users in which network locations?

A.

Only those users inside the network

B.

Only those users accessing the network remotely over VPN

C.

All users both inside and outside of the network

D.

Only those users outside the network

What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?

A.

New endpoint detection

B.

New incident

C.

Alert > Identity detection

D.

Spotlight user action > Host

The CISO of your organization recently read a report about the increased usage of identity brokers and is interested in finding a solution for the company. Which of the following makes Falcon Identity a valid solution for the organization?

A.

Provides the ability to audit and record sessions across multiple methods, such as SSH, RDP, and SMB

B.

Falcon Identity is able to be a middleware between Active Directory and a Human Resource Information System (HRIS)

C.

Gives the organization the ability to proactively mitigate risks, as well as protect critical Active Directory infrastructure through Policy Rules

D.

Allows administrators to store and delegate passwords to application servers

Which of the following would cause an identity-based incident type to change?

A.

An exclusion added to the incident

B.

A user linked detections to the incident in the console

C.

A user changed the incident type in the console

D.

Detections related to the incident

The Enforce section of Identity Protection is used to:

A.

Configure domains, appliances, subnets, connectors, risk configuration, and settings

B.

Define policy rules that determine what actions to take in response to certain triggers observed in the environment

C.

View all identity-based detections and identity-based incidents in the environment

D.

Gain an overview of the domain and indicate whether the domain follows best security practice

Page: 1 / 1
Total 58 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved