Crowdstrike Pre-hire Flashcards
What is Active Directory Security?
a directory service developed by Microsoft that stores information about network resources, including users, computers, and other devices. It facilitates centralized authentication, authorization, and management of network resources in a Windows domain environment.
______________can be interconnected in hierarchical structures called trees or forests
Domains
What is a centralized platform that authenticates users and computers, dterming their access rights to resources based on configuration policies and permision.
Active Directory
T/F: Active Directory can integrate with other services
True
why is Active Directory so important?
Active Directory is essential for organizations that rely on Microsoft Windows Server environments because it provides a centralized way to manage user accounts, permissions, and access control.
whats is an event long monitoring system used for?
uncover vulnerbilities in a Active Directory
What type of assessment helps users determine of their Active Directory is clean or has any vulnerabilities
Technical Risk Assessment
The lifetime of Active Directory tombstone objects is ______ days
60
The most important recovery measure for securing Active Directory is outlining a __________. _______. _________.
Disaster Recovery process
Crowdstrike Falcon ________ _______ ______can help you detect identity-based threats in real time using artificial intelligence and behavioral analytics to stop modern attacks like ransomwar
Identity Threat Detection
T/F: CrowdStrike Falcon® Identity Threat Detection is a tool that helps teams stop threats, understand their network accounts, and identify suspicious activity using AI for threat detection
True
An _______ is any device that connects to the corporate network from outside its firewall. Examples of endpoint devices include:
Laptops
Tablets
Mobile devices
Internet of things (IoT) devices
Point-of-sale (POS) systems
Switches
Digital printers
Endpoint
______ ________ is the cybersecurity approach to defending — such as desktops, laptops, and mobile devices — from malicious activity
Endpoint Security
What is an EPP or endpoint protection platform (EPP)?
SOLUTION to detet and prevent security threats and other malicious activities, and also invstigates and remadation capabilties need to respond to a dynamic seceruity issue.
T/F: Not every endpoint be a entry of attack
False
what type of security posture that is on-premise
“traditional” or “legacy”
Protecting against endpoint attacks is challenging because endpoints exist where humans and machines _______
intersect
_______ is A software component installed on endpoints to communicate with the management console in the data center. It helps enforce security policies and receives updates or instructions from the central management system.
Agent
problems that legacy approach gives to IT teams is that it can create Security Silos which means what?
it means that because administrators can only manage endpoints within their perimeter, they might not have visibility or control over security measures implemented in other parts of the network
what does a hybrid approach mean in security architeture?
started off on-premise then changed to cloud structure, but have both installed.
what type of security structure allows managers/admin to remotely monitor and manage endpoints through a Centralized managment console that connects devices remotely through agents and in the cloud?
cloud-native
Y/N: does Cloud-Native solutions allow IT teams to remove silos and expand thier reach at their best capabilities.
Yes
__________is often part of an endpoint security solution and is generally regarded as one of the more basic forms of endpoint protection.
Antivirus
T/F: Antivirus can prevent an attack it has never seen before (not just a signature attack)
False