Crowdstrike Pre-hire Flashcards

1
Q

What is Active Directory Security?

A

a directory service developed by Microsoft that stores information about network resources, including users, computers, and other devices. It facilitates centralized authentication, authorization, and management of network resources in a Windows domain environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______________can be interconnected in hierarchical structures called trees or forests

A

Domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a centralized platform that authenticates users and computers, dterming their access rights to resources based on configuration policies and permision.

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F: Active Directory can integrate with other services

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why is Active Directory so important?

A

Active Directory is essential for organizations that rely on Microsoft Windows Server environments because it provides a centralized way to manage user accounts, permissions, and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

whats is an event long monitoring system used for?

A

uncover vulnerbilities in a Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of assessment helps users determine of their Active Directory is clean or has any vulnerabilities

A

Technical Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The lifetime of Active Directory tombstone objects is ______ days

A

60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The most important recovery measure for securing Active Directory is outlining a __________. _______. _________.

A

Disaster Recovery process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Crowdstrike Falcon ________ _______ ______can help you detect identity-based threats in real time using artificial intelligence and behavioral analytics to stop modern attacks like ransomwar

A

Identity Threat Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: CrowdStrike Falcon® Identity Threat Detection is a tool that helps teams stop threats, understand their network accounts, and identify suspicious activity using AI for threat detection

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An _______ is any device that connects to the corporate network from outside its firewall. Examples of endpoint devices include:
Laptops
Tablets
Mobile devices
Internet of things (IoT) devices
Point-of-sale (POS) systems
Switches
Digital printers

A

Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ ________ is the cybersecurity approach to defending — such as desktops, laptops, and mobile devices — from malicious activity

A

Endpoint Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an EPP or endpoint protection platform (EPP)?

A

SOLUTION to detet and prevent security threats and other malicious activities, and also invstigates and remadation capabilties need to respond to a dynamic seceruity issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F: Not every endpoint be a entry of attack

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what type of security posture that is on-premise

A

“traditional” or “legacy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Protecting against endpoint attacks is challenging because endpoints exist where humans and machines _______

A

intersect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_______ is A software component installed on endpoints to communicate with the management console in the data center. It helps enforce security policies and receives updates or instructions from the central management system.

A

Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

problems that legacy approach gives to IT teams is that it can create Security Silos which means what?

A

it means that because administrators can only manage endpoints within their perimeter, they might not have visibility or control over security measures implemented in other parts of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what does a hybrid approach mean in security architeture?

A

started off on-premise then changed to cloud structure, but have both installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what type of security structure allows managers/admin to remotely monitor and manage endpoints through a Centralized managment console that connects devices remotely through agents and in the cloud?

A

cloud-native

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Y/N: does Cloud-Native solutions allow IT teams to remove silos and expand thier reach at their best capabilities.

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__________is often part of an endpoint security solution and is generally regarded as one of the more basic forms of endpoint protection.

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F: Antivirus can prevent an attack it has never seen before (not just a signature attack)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Endpoint security tools that provide continuous breach prevention must integrate these fundamental elements: (4)
1. Prevention: NGAV 2. Detection: EDR 3. Manage threat hunting 4. Threat intelligence integration
26
NGAV
Next Generation anti-virus
27
________ is an umbrella term used to describe a program or code created to harm a computer, network, or server
malware
28
______ _______ _______ employs advanced endpoint protection technologies, such as AI and machine learning, to detect and prevent both known and unknown malware.
Next-generation antivirus (NGAV)
29
what are the various elemnts that NGAV can examine
file hashes, URLs, and IP addresses to identify threats.
30
is the use of NGAV proactive or reactive in regards to defense?
proactive
31
t/f: traditional antivirues solutions detect less than half of all atttacks
true
32
why is traditional antivirus so slow and ineffective?
they only can detect signatures that someone has seen or manually put into the database by a contributor
33
what can close the time gap between a malware that is just created to turn into a signature malware.
Next generation antivirus NGAV
34
what does a "silent Failure" mean?
when a succesfull attack takes place, and they are in your system for days, weeks, and even months
35
______ _______ _______solutions offer continuous and comprehensive visibility into endpoint activities, enabling businesses to detect and respond to security breaches in real time.
Endpoint dectection response (EDR)
36
y/n: automation or the use of AI can detect every attack?
No
37
who and what is managed threat hunting?
conducted by elite teams that learn from incidents that have already occurred, aggregate crowdsourced data, and provide guidance on how best to respond when malicious activity is detected.
38
There is a need to keep evolving your cybersecurity, because new and tougher threats occur. 2 common problems arrive from Sophisticated adversaries and APTs. What is an APTs?
An advanced persistent threat (APT) is a sophisticated, sustained cyberattack in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time.
39
how long should a threat intelligence integration solution wait to investigate all incidients
minutes
40
_________ __ _________ focus on detecting the intent of what an attacker is trying to accomplish, regardless of the malware or exploit used in an attack.
Indicators of attack (IOA)
41
T/F: IOC and IOA can detect and prevent zero-day attacks and malware - free intrusions
False
42
_______ __ _______ is evidence found on a computer indicating a security breach in the network. Investigators collect this data after suspicious incidents, scheduled checks, or upon discovering unusual network activity. The goal is to create better tools for detecting and isolating suspicious files in the futur
Indicator of compromise (IOC)
43
when do you find/ run into IOCs???
after an incident or through scheduled checks
44
what is the purpose of an IOC?
develop smarter tools for the future & locks up a suspicious file
45
what is a whaling attack?
basically a spear phising attack, but targets higher level indivsuals
45
______ _______ is a type of phishing attack that targets specific individuals or organizations typically through malicious emails. GOAL is steal login creditioals in infect a target device
spear phishiing
45
difference between Phising, spear phisihing, and whaling: spear phising
priotize quality of the attack
46
difference between Phising, spear phisihing, and whaling: phising
priotizes quantity
47
difference between Phising, spear phisihing, and whaling: whaling
prioritizes C-level targerts
48
IOA vs IOC
IOA can collect and analyze what is happening in real time
49
4 keys from being CLOUD-NATIVE
1. REDUCED COST AND COMPLEXITY 2. PROTECTION OF THE CROWD 3. EFFORTLESS SCALABILITY 4. WORKS ON DAY ONE
50
what are the three things that come with the CrowdStrike Falcon® Endpoint Protection Enterprise ?
1. Falcon prevent 2. Insight XDR 3. Adversary Intelligence
51
_________ ______ _________refers to the technologies, policies, services and security controls that protect any type of data in the cloud from loss, leakage or misuse through breaches, exfiltration and unauthorized access
cloud data security
52
The _____ is a term used to describe servers — as well as any associated services, software applications, databases, containers and workloads — that are accessed remotely via the internet
cloud
53
T/f: cloud security — and, by extension, cloud data security — is a shared responsibility between the cloud service provider (CSP) and its customers.
True
54
3 examples of CSP or cloud service provider
1. Google cloud platform (GCP) 2. Amazon Web Services (AWS) 3. Microsoft Azure (Azure)
55
Why should businesses store data in the cloud? (4)
1. lower cost 2. resource optimization 3. improved access 4. scalability
56
____________ are the No. 1 vulnerability in a cloud environment and can lead to overly permissive privileges on accounts, insufficient logging and other security gaps that expose organizations to cloud breaches, insider threats and adversaries who leverage vulnerabilities to gain access to data.
misconfigurations
57
API stand for?
Application Programming interface
58
____________ _______________ _____________ is a set of rules and protocols that allows different software applications to communicate and interact with each other.
API, or Application Programming Interface
59
t/f: In summary, APIs facilitate the exchange of data and functionalities between different software applications while having no security risks
false; there is a ton of risks
60
________ ________ _________ __________ helps keep cloud environments safe by automatically finding and fixing risks across different cloud services like IaaS, SaaS, and PaaS.
Cloud Security Posture Management (CSPM):
61
______________ __________________ ______________ is the process of continuously monitoring for, and removing threats from cloud workloads and containers. also can work in any location
Cloud Workload Protection (CWP)
62
are like virtual boxes that hold everything a workload needs to run smoothly. They package up the workload's software and all its parts so it can work the same way no matter where it goes.
containers
63
are basically tasks or jobs that run on the internet instead of on your own computer. They can be anything from running a website to analyzing data
cloud workloads
64
t/f; Cloud workload protection is like a bodyguard for your stuff in the cloud. It checks for weak spots and helps fix them, while also making sure no bad guys sneak in
true
65
___________ ___________ is a framework of policies and rules used by businesses to manage their operations in the cloud. It ensures data security, system integration, and proper deployment of cloud computing resources. Key Points: Manages cloud operations and security. Ensures data security and system integration. Flexible to accommodate third-party vendors and different business teams
cloud governance
66
_____ ________ is an approach to building and deploying applications optimized for cloud computing. It emphasizes scalability, resilience, and ease of management in the cloud environment. Key Points: Optimized approach for cloud computing. Focuses on scalability, resilience, and ease of management enable faster, more efficient development and deployment of applications in the cloud environment.
cloud native
67
_______ ___________ __ _______ ____________ () collects and analyzes data from IT systems to detect security threats and stores logs centrally. Key Points: Collects and analyzes data for security threats. Stores logs from various sources in a central system. Use in Cybersecurity: (_______) helps organizations monitor and respond to security incidents effectively by providing a centralized view of security data.
SIEM (Security Information and Event Management)
68
________ _____________ ___________ gathers, sorts, and stores log data from different sources in one centralized location. Key Points: Gathers and stores log data from various sources. Provides a single point of access for network and application data. Use in IT Operations: ____ helps IT, DevOps, and SecOps professionals manage log data efficiently and access relevant information for decision-making
Log Management System (LMS)