Enter a player name to begin or load your saved progress.
CrowdStrike Holdings, Inc. maintains its headquarters in Sunnyvale, California, a location that has consistently served as its principal executive office.
Answer: False
Explanation: CrowdStrike's current headquarters is in Austin, Texas. While its principal executive office was previously in Sunnyvale, California, it has since relocated.
Shawn Henry, a former FBI official, was appointed in 2012 to lead CrowdStrike Services, Inc., a subsidiary specializing in security and response services.
Answer: True
Explanation: Shawn Henry, a former FBI official, was hired in 2012 to lead CrowdStrike Services, Inc., which focuses on security and response services.
Which of the subsequent services is NOT a primary offering of CrowdStrike Holdings, Inc.?
Answer: Physical data center security
Explanation: CrowdStrike Holdings, Inc. primarily provides endpoint security, threat intelligence, and cyberattack response services, not physical data center security.
Which of the following individuals was NOT a co-founder of CrowdStrike in 2011?
Answer: Shawn Henry
Explanation: CrowdStrike was co-founded by George Kurtz, Dmitri Alperovitch, and Gregg Marston. Shawn Henry was hired in 2012, not a co-founder.
In which year was Shawn Henry, a former FBI official, appointed to lead CrowdStrike Services, Inc.?
Answer: 2012
Explanation: Shawn Henry, a former FBI official, was hired in 2012 to lead CrowdStrike Services, Inc.
In May 2014, CrowdStrike's reports were instrumental in assisting the U.S. Department of Justice in indicting five Russian military hackers for economic cyber espionage.
Answer: False
Explanation: In May 2014, CrowdStrike's reports helped the U.S. Department of Justice charge five Chinese military hackers, not Russian, for economic cyber espionage.
CrowdStrike identified Energetic Bear, a group associated with Russia's Federal Security Service, as primarily targeting the global energy sector for intelligence operations.
Answer: True
Explanation: CrowdStrike identified Energetic Bear, linked to Russia's Federal Security Service, as conducting intelligence operations mainly against the global energy sector.
The VENOM vulnerability, disclosed by CrowdStrike in May 2015, constituted a critical flaw discovered in a proprietary hypervisor, rather than an open-source one.
Answer: False
Explanation: The VENOM vulnerability, disclosed by CrowdStrike in May 2015, was a critical flaw found in Quick Emulator (QEMU), which is an open-source hypervisor.
CrowdStrike reported the identification of Chinese hackers targeting technology and pharmaceutical companies in October 2015, an event that coincided with a U.S.-China agreement prohibiting economic espionage.
Answer: True
Explanation: CrowdStrike reported in October 2015 that Chinese hackers were targeting technology and pharmaceutical companies, coinciding with a U.S.-China agreement against economic espionage.
In which of the following high-profile cyberattacks was CrowdStrike involved in the investigation?
Answer: The 2014 Sony Pictures hack
Explanation: CrowdStrike was involved in investigating the 2014 Sony Pictures hack, among other notable cyberattacks.
CrowdStrike's May 2014 reports were pivotal in the indictment of military hackers from which nation for economic cyber espionage?
Answer: China
Explanation: CrowdStrike's reports in May 2014 were instrumental in helping the U.S. Department of Justice charge five Chinese military hackers for economic cyber espionage.
Identify the Russian government-linked group that CrowdStrike determined was primarily targeting the global energy sector.
Answer: Energetic Bear
Explanation: CrowdStrike identified Energetic Bear, a group linked to Russia's Federal Security Service, as primarily targeting the global energy sector.
The VENOM vulnerability, disclosed by CrowdStrike in May 2015, was a critical flaw identified in which open-source hypervisor?
Answer: Quick Emulator (QEMU)
Explanation: The VENOM vulnerability, disclosed by CrowdStrike in May 2015, was a critical flaw found in Quick Emulator (QEMU), an open-source hypervisor.
What activity was reported by Chinese hackers in October 2015, coinciding with a U.S.-China agreement on economic espionage?
Answer: Targeting technology and pharmaceutical companies
Explanation: In October 2015, CrowdStrike reported identifying Chinese hackers targeting technology and pharmaceutical companies, coinciding with a U.S.-China agreement against economic espionage.
By June 2018, CrowdStrike's valuation surpassed $3 billion, having accumulated $480 million through Series D and Series E funding rounds by May 2019.
Answer: True
Explanation: By June 2018, CrowdStrike's valuation exceeded $3 billion, and by May 2019, it had raised a total of $480 million through Series D and Series E rounds.
CrowdStrike's shares experienced a decline of over 70% immediately after its Initial Public Offering (IPO) on the Nasdaq in June 2019.
Answer: False
Explanation: Following its IPO on the Nasdaq in June 2019, CrowdStrike's shares increased by more than 70%, indicating strong investor confidence.
For fiscal year 2025, CrowdStrike reported a total revenue of $1.38 billion and a net cash flow from operations of $3.95 billion.
Answer: False
Explanation: For fiscal year 2025, CrowdStrike reported a total revenue of $3.95 billion and a net cash flow from operations of $1.38 billion. The question reverses these figures.
CrowdStrike Holdings, Inc. operates as a private company, with its shares unavailable for trading on stock exchanges.
Answer: False
Explanation: CrowdStrike Holdings, Inc. is a public company, and its shares are traded on Nasdaq under the ticker symbol CRWD.
CrowdStrike's total revenue for fiscal year 2020 amounted to $874.4 million.
Answer: False
Explanation: CrowdStrike's total revenue for fiscal year 2020 was $481.4 million. $874.4 million was the revenue for fiscal year 2021.
Under which ticker symbol is CrowdStrike Holdings, Inc. publicly traded on Nasdaq?
Answer: CRWD
Explanation: CrowdStrike Holdings, Inc. is traded on Nasdaq under the ticker symbol CRWD (Class A).
By June 2018, CrowdStrike's valuation surpassed what monetary threshold?
Answer: $3 billion
Explanation: By June 2018, CrowdStrike's valuation exceeded $3 billion.
Describe the initial market response to CrowdStrike's Initial Public Offering (IPO) on the Nasdaq in June 2019.
Answer: Shares increased by more than 70%
Explanation: Following its IPO on the Nasdaq in June 2019, CrowdStrike's shares increased by more than 70%.
State CrowdStrike's total revenue for fiscal year 2025.
Answer: $3.95 billion
Explanation: For fiscal year 2025, CrowdStrike reported a total revenue of $3.95 billion.
CrowdStrike's inaugural product, an antivirus package known as CrowdStrike Falcon, was introduced in June 2013, signifying its entry into the endpoint protection market.
Answer: True
Explanation: CrowdStrike launched its first product, CrowdStrike Falcon, an antivirus package, in June 2013, marking its entry into endpoint protection.
CrowdStrike introduced Falcon Foundry, a no-code application development platform, in September 2023.
Answer: True
Explanation: CrowdStrike launched Falcon Foundry, a no-code application development platform, in September 2023.
Identify CrowdStrike's inaugural product, launched in June 2013.
Answer: CrowdStrike Falcon
Explanation: CrowdStrike's first product, launched in June 2013, was an antivirus package named CrowdStrike Falcon.
Identify the generative AI security analyst introduced by CrowdStrike in 2023.
Answer: Charlotte AI
Explanation: In 2023, CrowdStrike introduced Charlotte AI, a generative AI security analyst.
CrowdStrike acquired Payload Security in November 2017 to augment its capabilities in automated malware analysis.
Answer: True
Explanation: CrowdStrike acquired Payload Security in November 2017 to enhance its capabilities in automated malware analysis sandbox technology.
CrowdStrike acquired Preempt Security in September 2020 for $96 million, aiming to expand its zero trust and conditional access technology.
Answer: True
Explanation: CrowdStrike acquired Preempt Security in September 2020 for $96 million to expand its zero trust and conditional access technology.
The acquisition of Humio in February 2021 was primarily intended to broaden CrowdStrike's physical security offerings.
Answer: False
Explanation: The acquisition of Humio in February 2021 was to integrate log aggregation capabilities into CrowdStrike's Extended Detection and Response (XDR) offering, not to expand physical security offerings.
SecureCircle, acquired by CrowdStrike in November 2021, concentrated on extending zero trust endpoint security to encompass data protection.
Answer: True
Explanation: SecureCircle, acquired by CrowdStrike in November 2021, was a SaaS-based cybersecurity service designed to extend zero trust endpoint security to data protection.
CrowdStrike acquired Reposify in October 2022 with the aim of enhancing its internal network monitoring capabilities.
Answer: False
Explanation: CrowdStrike acquired Reposify in October 2022 to enhance its risk management by identifying external vulnerabilities on an organization's internet-facing assets, not internal network monitoring.
In 2024, CrowdStrike acquired two Israeli cloud security startups, namely Flow Security and Adaptive Shield.
Answer: True
Explanation: In 2024, CrowdStrike acquired two Israeli cloud security startups: Flow Security for $200 million and Adaptive Shield for $300 million.
CrowdStrike's August 2025 acquisition of Onum was intended to significantly enhance its Falcon Next-Generation Security Information and Event Management (NG SIEM) platform through the management of real-time telemetry pipelines.
Answer: True
Explanation: CrowdStrike's acquisition of Onum in August 2025 aimed to 'supercharge' its Falcon Next-Generation Security Information and Event Management (NG SIEM) platform by managing real-time telemetry pipelines.
In what specific area did CrowdStrike aim to enhance its capabilities by acquiring Payload Security in November 2017?
Answer: Automated malware analysis sandbox technology
Explanation: CrowdStrike acquired Payload Security in November 2017 to enhance its capabilities in automated malware analysis sandbox technology.
State the acquisition cost for Preempt Security by CrowdStrike in September 2020.
Answer: $96 million
Explanation: CrowdStrike acquired Preempt Security in September 2020 for $96 million.
Articulate the strategic rationale underpinning CrowdStrike's February 2021 acquisition of Humio.
Answer: To integrate log aggregation capabilities into its XDR offering
Explanation: CrowdStrike acquired Humio in February 2021 to integrate its log aggregation capabilities into CrowdStrike's Extended Detection and Response (XDR) offering.
SecureCircle, acquired by CrowdStrike in November 2021, was a SaaS-based cybersecurity service primarily focused on extending zero trust endpoint security to which domain?
Answer: Data protection
Explanation: SecureCircle, acquired by CrowdStrike in November 2021, focused on extending zero trust endpoint security to data protection.
State the objective of CrowdStrike's acquisition of Reposify in October 2022.
Answer: To enhance risk management by identifying external vulnerabilities
Explanation: CrowdStrike acquired Reposify in October 2022 to enhance its risk management capabilities by identifying and managing potential vulnerabilities on an organization's internet-facing assets.
Identify the Israeli cybersecurity startup acquired by CrowdStrike for $350 million in 2023.
Answer: Bionic.ai
Explanation: In 2023, CrowdStrike acquired the Israeli cybersecurity startup Bionic.ai for $350 million.
In August 2025, CrowdStrike acquired Onum with the objective of significantly enhancing which of its platforms?
Answer: Falcon Next-Generation Security Information and Event Management (NG SIEM)
Explanation: In August 2025, CrowdStrike acquired Onum to 'supercharge' its Falcon Next-Generation Security Information and Event Management (NG SIEM) platform.
On July 19, 2024, CrowdStrike shares concluded trading with an 11.10% increase following the significant IT outage.
Answer: False
Explanation: On July 19, 2024, CrowdStrike shares closed trading down by 11.10% after the major IT outage.
The July 2024 CrowdStrike outage was attributed to a defective hardware component within its cloud infrastructure.
Answer: False
Explanation: The July 2024 CrowdStrike outage was caused by a faulty update to a configuration file (Channel File 291) within the Falcon endpoint detection and response agent, not a hardware component.
CrowdStrike advised booting affected computers into safe mode or Windows Recovery Mode to manually delete Channel File 291 as a remedial action for the July 2024 outage.
Answer: True
Explanation: CrowdStrike recommended booting affected computers into safe mode or Windows Recovery Mode to manually delete Channel File 291 as a solution for the July 2024 outage.
CrowdStrike instituted process enhancements following the July 2024 outage, encompassing new content configuration test procedures and staggered update rollouts.
Answer: True
Explanation: CrowdStrike implemented several process improvements after the July 2024 outage, including new content configuration test procedures and staggering update rollouts.
The estimated financial cost of the July 2024 CrowdStrike incident for Fortune 500 companies was approximately $5.4 million.
Answer: False
Explanation: The estimated financial cost of the July 2024 CrowdStrike incident to Fortune 500 companies was $5.4 billion, not $5.4 million.
What constituted the principal cause of the extensive global computer outages in July 2024, attributed to CrowdStrike?
Answer: A faulty update to its security software
Explanation: The widespread global computer outages in July 2024 were caused by a faulty update to CrowdStrike's security software.
What was the immediate financial impact on CrowdStrike's stock on July 19, 2024, the day of the significant IT outage?
Answer: Shares dropped by 11.10%
Explanation: On July 19, 2024, CrowdStrike shares closed trading down by 11.10% after the major IT outage.
Identify the specific technical mechanism that precipitated the July 2024 CrowdStrike outage.
Answer: A faulty update to a configuration file (Channel File 291)
Explanation: The July 2024 CrowdStrike outage was caused by a faulty update to a configuration file, specifically Channel File 291, within the Falcon endpoint detection and response agent.
Which of the following was a recommended solution for users impacted by the July 2024 CrowdStrike outage?
Answer: Booting into safe mode to manually delete Channel File 291
Explanation: CrowdStrike recommended booting affected computers into safe mode or Windows Recovery Mode to manually delete Channel File 291 as a solution for the July 2024 outage.
Quantify the estimated financial cost incurred by Fortune 500 companies due to the July 2024 CrowdStrike incident.
Answer: $5.4 billion
Explanation: The estimated financial cost of the July 2024 CrowdStrike incident to Fortune 500 companies was $5.4 billion.
James Comey testified that the FBI directly accessed the DNC servers to conduct forensic analysis following the cyberattacks.
Answer: False
Explanation: James Comey testified that the FBI's request for direct access to the DNC servers for forensics was denied; instead, CrowdStrike shared its observations.
CrowdStrike's December 2016 report alleged that Fancy Bear compromised a Ukrainian artillery application, resulting in substantial losses for Ukrainian artillery units.
Answer: True
Explanation: CrowdStrike's December 2016 report indeed claimed that Fancy Bear hacked a Ukrainian artillery app, leading to significant losses for Ukrainian artillery units.
Both the International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense endorsed CrowdStrike's assessment regarding Ukrainian artillery losses attributed to Russian hacking.
Answer: False
Explanation: Both the International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense rejected CrowdStrike's assessment of Ukrainian artillery losses, stating the data was misused and losses were smaller and not linked to Russian hacking.
A conspiracy theory, widely disseminated during the Trump-Ukraine scandal, posited that the Ukrainian government, in collaboration with CrowdStrike, hacked the DNC to falsely implicate Russia.
Answer: True
Explanation: During the Trump-Ukraine scandal, a conspiracy theory alleged that the Ukrainian government, with CrowdStrike, hacked the DNC to falsely implicate Russia, a theory that has been debunked.
CrowdStrike, Mandiant, and ThreatConnect collectively concluded with high certainty that the DNC hack was perpetrated by Russian intelligence services.
Answer: True
Explanation: James Comey testified that CrowdStrike, Mandiant, and ThreatConnect all concluded with high certainty that the DNC hack was the work of Russian intelligence services (APT 28 and APT 29).
Based on James Comey's testimony, which organizations examined the DNC hack evidence and attributed it to Russian intelligence services?
Answer: CrowdStrike, Mandiant, and ThreatConnect
Explanation: According to James Comey's testimony, CrowdStrike, Mandiant, and ThreatConnect reviewed the DNC hack evidence and concluded it was the work of Russian intelligence services.
Based on James Comey's account, what was the reason for the FBI's lack of direct access to the DNC servers for forensic purposes?
Answer: The DNC denied the FBI's request for direct access.
Explanation: James Comey testified that the FBI's request for direct access to the DNC servers for forensics was denied by the DNC.
Identify the Ukrainian artillery application that CrowdStrike's December 2016 report alleged was compromised by Fancy Bear.
Answer: ArtOS
Explanation: CrowdStrike's December 2016 report claimed Fancy Bear hacked the Ukrainian artillery app named ArtOS.
Which organizations disputed CrowdStrike's assessment concerning Ukrainian artillery losses attributed to Russian hacking?
Answer: The International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense
Explanation: Both the International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense rejected CrowdStrike's assessment regarding Ukrainian artillery losses due to Russian hacking.