New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

IDP CrowdStrike Certified Identity Specialist(CCIS) Exam Questions and Answers

Questions 4

Within which Identity Protection menu would an administrator enableAuthentication Traffic Inspection (ATI)for a domain?

Options:

A.

Configure > Settings

B.

Enforce > Policy Rules

C.

Enforce > Policy Settings

D.

Configure > Identity Configuration Policies

Buy Now
Questions 5

Falcon Identity Protection can continuously assess identity events and associate them with potential threatsWITHOUTwhich of the following?

Options:

A.

Machine-learning-powered detection rules

B.

API-based connectors

C.

Ingesting logs

D.

The need for string-based queries

Buy Now
Questions 6

For false positives, the Detection details can be set to new“Actions”using:

Options:

A.

exits

B.

remediations

C.

exceptions

D.

recommendations

Buy Now
Questions 7

How does Identity Protection extend the capabilities of existing multi-factor authentication (MFA)?

Options:

A.

Implementation of a second-layer security control using policy rules as it detects risky or abnormal behaviors

B.

Identity Protection is not going to detect risky user behavior

C.

Identity Protection will replace third-party MFA and trigger as it detects risky or abnormal behaviors

D.

Identity Protection does not support on-premises MFA connectors

Buy Now
Questions 8

When an endpoint that has not been used in the last90 daysbecomes active, a detection forUse of Stale Endpointis reported.

Options:

A.

180 days

B.

90 days

C.

30 days

D.

60 days

Buy Now
Questions 9

Under which CrowdStrike documentation category could you find Identity Protection API information?

Options:

A.

Tools and Reference

B.

Falcon Management

C.

CrowdStrike Store

D.

CrowdStrike APIs

Buy Now
Questions 10

What trigger will cause a Falcon Fusion Workflow to activate from Falcon Identity Protection?

Options:

A.

New endpoint detection

B.

New incident

C.

Alert > Identity detection

D.

Spotlight user action > Host

Buy Now
Questions 11

The Enforce section of Identity Protection is used to:

Options:

A.

Configure domains, appliances, subnets, connectors, risk configuration, and settings

B.

Define policy rules that determine what actions to take in response to certain triggers observed in the environment

C.

View all identity-based detections and identity-based incidents in the environment

D.

Gain an overview of the domain and indicate whether the domain follows best security practice

Buy Now
Questions 12

Which of the following IDaaS connectors will allow Identity to ingest cloud activity along with applying SSO Policy?

Options:

A.

ADFS

B.

Okta SSO

C.

Azure NPS

D.

SAML

Buy Now
Questions 13

When creating an API client, which scope withWritepermissions must be enabled prior to using Identity Protection API?

Options:

A.

Identity Protection Assessment

B.

Identity Protection Health

C.

There is no need for Write permissions in order to use IDP API

D.

Identity Protection GraphQL

Buy Now
Questions 14

IDP Question 14

Which of the followingBESTindicates that this user has an established baseline?

Options:

A.

The user was found logging into five endpoints

B.

The user has endpoints that they are considered owners of

C.

The user has a risk score of 6.4

D.

The user has recent logon activity on ETIS-WS03

Buy Now
Questions 15

How many days will an identity-based incident be suppressed if new events related to the same incident occur?

Options:

A.

30 days

B.

7 days

C.

14 days

D.

5 days

Buy Now
Questions 16

Which option can be selected from the Threat Hunter menu to open the current Threat Hunter query in a new window as Graph API format?

Options:

A.

Export to API Builder

B.

Save as Custom Query

C.

Save as Custom Report

D.

Open Query in API Builder

Buy Now
Questions 17

The CISO of your organization recently read a report about the increased usage of identity brokers and is interested in finding a solution for the company. Which of the following makes Falcon Identity a valid solution for the organization?

Options:

A.

Provides the ability to audit and record sessions across multiple methods, such as SSH, RDP, and SMB

B.

Falcon Identity is able to be a middleware between Active Directory and a Human Resource Information System (HRIS)

C.

Gives the organization the ability to proactively mitigate risks, as well as protect critical Active Directory infrastructure through Policy Rules

D.

Allows administrators to store and delegate passwords to application servers

Buy Now
Exam Code: IDP
Exam Name: CrowdStrike Certified Identity Specialist(CCIS) Exam
Last Update: Jan 12, 2026
Questions: 58

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now IDP testing engine

PDF (Q&A)

$43.57  $124.49
buy now IDP pdf