Welcome!

Enter a player name to begin or load your saved progress.

CrowdStrike Wiki2Web Clarity Challenge

Home Return to Study Hints Random
Global Score: 0
Trophies: 0 🏆

‹ Back

Score: 0 / 100

Study Guide: CrowdStrike: Company History, Cybersecurity Innovations, and Major Incidents

Cheat Sheet:
CrowdStrike: Company History, Cybersecurity Innovations, and Major Incidents Study Guide

Company Genesis and Core Services

CrowdStrike Holdings, Inc. maintains its headquarters in Sunnyvale, California, a location that has consistently served as its principal executive office.

Answer: False

Explanation: CrowdStrike's current headquarters is in Austin, Texas. While its principal executive office was previously in Sunnyvale, California, it has since relocated.

Return to Game

Shawn Henry, a former FBI official, was appointed in 2012 to lead CrowdStrike Services, Inc., a subsidiary specializing in security and response services.

Answer: True

Explanation: Shawn Henry, a former FBI official, was hired in 2012 to lead CrowdStrike Services, Inc., which focuses on security and response services.

Return to Game

Which of the subsequent services is NOT a primary offering of CrowdStrike Holdings, Inc.?

Answer: Physical data center security

Explanation: CrowdStrike Holdings, Inc. primarily provides endpoint security, threat intelligence, and cyberattack response services, not physical data center security.

Return to Game

Which of the following individuals was NOT a co-founder of CrowdStrike in 2011?

Answer: Shawn Henry

Explanation: CrowdStrike was co-founded by George Kurtz, Dmitri Alperovitch, and Gregg Marston. Shawn Henry was hired in 2012, not a co-founder.

Return to Game

In which year was Shawn Henry, a former FBI official, appointed to lead CrowdStrike Services, Inc.?

Answer: 2012

Explanation: Shawn Henry, a former FBI official, was hired in 2012 to lead CrowdStrike Services, Inc.

Return to Game

Early Threat Intelligence and Investigations

In May 2014, CrowdStrike's reports were instrumental in assisting the U.S. Department of Justice in indicting five Russian military hackers for economic cyber espionage.

Answer: False

Explanation: In May 2014, CrowdStrike's reports helped the U.S. Department of Justice charge five Chinese military hackers, not Russian, for economic cyber espionage.

Return to Game

CrowdStrike identified Energetic Bear, a group associated with Russia's Federal Security Service, as primarily targeting the global energy sector for intelligence operations.

Answer: True

Explanation: CrowdStrike identified Energetic Bear, linked to Russia's Federal Security Service, as conducting intelligence operations mainly against the global energy sector.

Return to Game

The VENOM vulnerability, disclosed by CrowdStrike in May 2015, constituted a critical flaw discovered in a proprietary hypervisor, rather than an open-source one.

Answer: False

Explanation: The VENOM vulnerability, disclosed by CrowdStrike in May 2015, was a critical flaw found in Quick Emulator (QEMU), which is an open-source hypervisor.

Return to Game

CrowdStrike reported the identification of Chinese hackers targeting technology and pharmaceutical companies in October 2015, an event that coincided with a U.S.-China agreement prohibiting economic espionage.

Answer: True

Explanation: CrowdStrike reported in October 2015 that Chinese hackers were targeting technology and pharmaceutical companies, coinciding with a U.S.-China agreement against economic espionage.

Return to Game

In which of the following high-profile cyberattacks was CrowdStrike involved in the investigation?

Answer: The 2014 Sony Pictures hack

Explanation: CrowdStrike was involved in investigating the 2014 Sony Pictures hack, among other notable cyberattacks.

Return to Game

CrowdStrike's May 2014 reports were pivotal in the indictment of military hackers from which nation for economic cyber espionage?

Answer: China

Explanation: CrowdStrike's reports in May 2014 were instrumental in helping the U.S. Department of Justice charge five Chinese military hackers for economic cyber espionage.

Return to Game

Identify the Russian government-linked group that CrowdStrike determined was primarily targeting the global energy sector.

Answer: Energetic Bear

Explanation: CrowdStrike identified Energetic Bear, a group linked to Russia's Federal Security Service, as primarily targeting the global energy sector.

Return to Game

The VENOM vulnerability, disclosed by CrowdStrike in May 2015, was a critical flaw identified in which open-source hypervisor?

Answer: Quick Emulator (QEMU)

Explanation: The VENOM vulnerability, disclosed by CrowdStrike in May 2015, was a critical flaw found in Quick Emulator (QEMU), an open-source hypervisor.

Return to Game

What activity was reported by Chinese hackers in October 2015, coinciding with a U.S.-China agreement on economic espionage?

Answer: Targeting technology and pharmaceutical companies

Explanation: In October 2015, CrowdStrike reported identifying Chinese hackers targeting technology and pharmaceutical companies, coinciding with a U.S.-China agreement against economic espionage.

Return to Game

Financial Growth and Market Presence

By June 2018, CrowdStrike's valuation surpassed $3 billion, having accumulated $480 million through Series D and Series E funding rounds by May 2019.

Answer: True

Explanation: By June 2018, CrowdStrike's valuation exceeded $3 billion, and by May 2019, it had raised a total of $480 million through Series D and Series E rounds.

Return to Game

CrowdStrike's shares experienced a decline of over 70% immediately after its Initial Public Offering (IPO) on the Nasdaq in June 2019.

Answer: False

Explanation: Following its IPO on the Nasdaq in June 2019, CrowdStrike's shares increased by more than 70%, indicating strong investor confidence.

Return to Game

For fiscal year 2025, CrowdStrike reported a total revenue of $1.38 billion and a net cash flow from operations of $3.95 billion.

Answer: False

Explanation: For fiscal year 2025, CrowdStrike reported a total revenue of $3.95 billion and a net cash flow from operations of $1.38 billion. The question reverses these figures.

Return to Game

CrowdStrike Holdings, Inc. operates as a private company, with its shares unavailable for trading on stock exchanges.

Answer: False

Explanation: CrowdStrike Holdings, Inc. is a public company, and its shares are traded on Nasdaq under the ticker symbol CRWD.

Return to Game

CrowdStrike's total revenue for fiscal year 2020 amounted to $874.4 million.

Answer: False

Explanation: CrowdStrike's total revenue for fiscal year 2020 was $481.4 million. $874.4 million was the revenue for fiscal year 2021.

Return to Game

Under which ticker symbol is CrowdStrike Holdings, Inc. publicly traded on Nasdaq?

Answer: CRWD

Explanation: CrowdStrike Holdings, Inc. is traded on Nasdaq under the ticker symbol CRWD (Class A).

Return to Game

By June 2018, CrowdStrike's valuation surpassed what monetary threshold?

Answer: $3 billion

Explanation: By June 2018, CrowdStrike's valuation exceeded $3 billion.

Return to Game

Describe the initial market response to CrowdStrike's Initial Public Offering (IPO) on the Nasdaq in June 2019.

Answer: Shares increased by more than 70%

Explanation: Following its IPO on the Nasdaq in June 2019, CrowdStrike's shares increased by more than 70%.

Return to Game

State CrowdStrike's total revenue for fiscal year 2025.

Answer: $3.95 billion

Explanation: For fiscal year 2025, CrowdStrike reported a total revenue of $3.95 billion.

Return to Game

Product Development and AI Integration

CrowdStrike's inaugural product, an antivirus package known as CrowdStrike Falcon, was introduced in June 2013, signifying its entry into the endpoint protection market.

Answer: True

Explanation: CrowdStrike launched its first product, CrowdStrike Falcon, an antivirus package, in June 2013, marking its entry into endpoint protection.

Return to Game

CrowdStrike introduced Falcon Foundry, a no-code application development platform, in September 2023.

Answer: True

Explanation: CrowdStrike launched Falcon Foundry, a no-code application development platform, in September 2023.

Return to Game

Identify CrowdStrike's inaugural product, launched in June 2013.

Answer: CrowdStrike Falcon

Explanation: CrowdStrike's first product, launched in June 2013, was an antivirus package named CrowdStrike Falcon.

Return to Game

Identify the generative AI security analyst introduced by CrowdStrike in 2023.

Answer: Charlotte AI

Explanation: In 2023, CrowdStrike introduced Charlotte AI, a generative AI security analyst.

Return to Game

Strategic Acquisitions

CrowdStrike acquired Payload Security in November 2017 to augment its capabilities in automated malware analysis.

Answer: True

Explanation: CrowdStrike acquired Payload Security in November 2017 to enhance its capabilities in automated malware analysis sandbox technology.

Return to Game

CrowdStrike acquired Preempt Security in September 2020 for $96 million, aiming to expand its zero trust and conditional access technology.

Answer: True

Explanation: CrowdStrike acquired Preempt Security in September 2020 for $96 million to expand its zero trust and conditional access technology.

Return to Game

The acquisition of Humio in February 2021 was primarily intended to broaden CrowdStrike's physical security offerings.

Answer: False

Explanation: The acquisition of Humio in February 2021 was to integrate log aggregation capabilities into CrowdStrike's Extended Detection and Response (XDR) offering, not to expand physical security offerings.

Return to Game

SecureCircle, acquired by CrowdStrike in November 2021, concentrated on extending zero trust endpoint security to encompass data protection.

Answer: True

Explanation: SecureCircle, acquired by CrowdStrike in November 2021, was a SaaS-based cybersecurity service designed to extend zero trust endpoint security to data protection.

Return to Game

CrowdStrike acquired Reposify in October 2022 with the aim of enhancing its internal network monitoring capabilities.

Answer: False

Explanation: CrowdStrike acquired Reposify in October 2022 to enhance its risk management by identifying external vulnerabilities on an organization's internet-facing assets, not internal network monitoring.

Return to Game

In 2024, CrowdStrike acquired two Israeli cloud security startups, namely Flow Security and Adaptive Shield.

Answer: True

Explanation: In 2024, CrowdStrike acquired two Israeli cloud security startups: Flow Security for $200 million and Adaptive Shield for $300 million.

Return to Game

CrowdStrike's August 2025 acquisition of Onum was intended to significantly enhance its Falcon Next-Generation Security Information and Event Management (NG SIEM) platform through the management of real-time telemetry pipelines.

Answer: True

Explanation: CrowdStrike's acquisition of Onum in August 2025 aimed to 'supercharge' its Falcon Next-Generation Security Information and Event Management (NG SIEM) platform by managing real-time telemetry pipelines.

Return to Game

In what specific area did CrowdStrike aim to enhance its capabilities by acquiring Payload Security in November 2017?

Answer: Automated malware analysis sandbox technology

Explanation: CrowdStrike acquired Payload Security in November 2017 to enhance its capabilities in automated malware analysis sandbox technology.

Return to Game

State the acquisition cost for Preempt Security by CrowdStrike in September 2020.

Answer: $96 million

Explanation: CrowdStrike acquired Preempt Security in September 2020 for $96 million.

Return to Game

Articulate the strategic rationale underpinning CrowdStrike's February 2021 acquisition of Humio.

Answer: To integrate log aggregation capabilities into its XDR offering

Explanation: CrowdStrike acquired Humio in February 2021 to integrate its log aggregation capabilities into CrowdStrike's Extended Detection and Response (XDR) offering.

Return to Game

SecureCircle, acquired by CrowdStrike in November 2021, was a SaaS-based cybersecurity service primarily focused on extending zero trust endpoint security to which domain?

Answer: Data protection

Explanation: SecureCircle, acquired by CrowdStrike in November 2021, focused on extending zero trust endpoint security to data protection.

Return to Game

State the objective of CrowdStrike's acquisition of Reposify in October 2022.

Answer: To enhance risk management by identifying external vulnerabilities

Explanation: CrowdStrike acquired Reposify in October 2022 to enhance its risk management capabilities by identifying and managing potential vulnerabilities on an organization's internet-facing assets.

Return to Game

Identify the Israeli cybersecurity startup acquired by CrowdStrike for $350 million in 2023.

Answer: Bionic.ai

Explanation: In 2023, CrowdStrike acquired the Israeli cybersecurity startup Bionic.ai for $350 million.

Return to Game

In August 2025, CrowdStrike acquired Onum with the objective of significantly enhancing which of its platforms?

Answer: Falcon Next-Generation Security Information and Event Management (NG SIEM)

Explanation: In August 2025, CrowdStrike acquired Onum to 'supercharge' its Falcon Next-Generation Security Information and Event Management (NG SIEM) platform.

Return to Game

The July 2024 Global Outage

On July 19, 2024, CrowdStrike shares concluded trading with an 11.10% increase following the significant IT outage.

Answer: False

Explanation: On July 19, 2024, CrowdStrike shares closed trading down by 11.10% after the major IT outage.

Return to Game

The July 2024 CrowdStrike outage was attributed to a defective hardware component within its cloud infrastructure.

Answer: False

Explanation: The July 2024 CrowdStrike outage was caused by a faulty update to a configuration file (Channel File 291) within the Falcon endpoint detection and response agent, not a hardware component.

Return to Game

CrowdStrike advised booting affected computers into safe mode or Windows Recovery Mode to manually delete Channel File 291 as a remedial action for the July 2024 outage.

Answer: True

Explanation: CrowdStrike recommended booting affected computers into safe mode or Windows Recovery Mode to manually delete Channel File 291 as a solution for the July 2024 outage.

Return to Game

CrowdStrike instituted process enhancements following the July 2024 outage, encompassing new content configuration test procedures and staggered update rollouts.

Answer: True

Explanation: CrowdStrike implemented several process improvements after the July 2024 outage, including new content configuration test procedures and staggering update rollouts.

Return to Game

The estimated financial cost of the July 2024 CrowdStrike incident for Fortune 500 companies was approximately $5.4 million.

Answer: False

Explanation: The estimated financial cost of the July 2024 CrowdStrike incident to Fortune 500 companies was $5.4 billion, not $5.4 million.

Return to Game

What constituted the principal cause of the extensive global computer outages in July 2024, attributed to CrowdStrike?

Answer: A faulty update to its security software

Explanation: The widespread global computer outages in July 2024 were caused by a faulty update to CrowdStrike's security software.

Return to Game

What was the immediate financial impact on CrowdStrike's stock on July 19, 2024, the day of the significant IT outage?

Answer: Shares dropped by 11.10%

Explanation: On July 19, 2024, CrowdStrike shares closed trading down by 11.10% after the major IT outage.

Return to Game

Identify the specific technical mechanism that precipitated the July 2024 CrowdStrike outage.

Answer: A faulty update to a configuration file (Channel File 291)

Explanation: The July 2024 CrowdStrike outage was caused by a faulty update to a configuration file, specifically Channel File 291, within the Falcon endpoint detection and response agent.

Return to Game

Which of the following was a recommended solution for users impacted by the July 2024 CrowdStrike outage?

Answer: Booting into safe mode to manually delete Channel File 291

Explanation: CrowdStrike recommended booting affected computers into safe mode or Windows Recovery Mode to manually delete Channel File 291 as a solution for the July 2024 outage.

Return to Game

Quantify the estimated financial cost incurred by Fortune 500 companies due to the July 2024 CrowdStrike incident.

Answer: $5.4 billion

Explanation: The estimated financial cost of the July 2024 CrowdStrike incident to Fortune 500 companies was $5.4 billion.

Return to Game

Controversies and Public Scrutiny

James Comey testified that the FBI directly accessed the DNC servers to conduct forensic analysis following the cyberattacks.

Answer: False

Explanation: James Comey testified that the FBI's request for direct access to the DNC servers for forensics was denied; instead, CrowdStrike shared its observations.

Return to Game

CrowdStrike's December 2016 report alleged that Fancy Bear compromised a Ukrainian artillery application, resulting in substantial losses for Ukrainian artillery units.

Answer: True

Explanation: CrowdStrike's December 2016 report indeed claimed that Fancy Bear hacked a Ukrainian artillery app, leading to significant losses for Ukrainian artillery units.

Return to Game

Both the International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense endorsed CrowdStrike's assessment regarding Ukrainian artillery losses attributed to Russian hacking.

Answer: False

Explanation: Both the International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense rejected CrowdStrike's assessment of Ukrainian artillery losses, stating the data was misused and losses were smaller and not linked to Russian hacking.

Return to Game

A conspiracy theory, widely disseminated during the Trump-Ukraine scandal, posited that the Ukrainian government, in collaboration with CrowdStrike, hacked the DNC to falsely implicate Russia.

Answer: True

Explanation: During the Trump-Ukraine scandal, a conspiracy theory alleged that the Ukrainian government, with CrowdStrike, hacked the DNC to falsely implicate Russia, a theory that has been debunked.

Return to Game

CrowdStrike, Mandiant, and ThreatConnect collectively concluded with high certainty that the DNC hack was perpetrated by Russian intelligence services.

Answer: True

Explanation: James Comey testified that CrowdStrike, Mandiant, and ThreatConnect all concluded with high certainty that the DNC hack was the work of Russian intelligence services (APT 28 and APT 29).

Return to Game

Based on James Comey's testimony, which organizations examined the DNC hack evidence and attributed it to Russian intelligence services?

Answer: CrowdStrike, Mandiant, and ThreatConnect

Explanation: According to James Comey's testimony, CrowdStrike, Mandiant, and ThreatConnect reviewed the DNC hack evidence and concluded it was the work of Russian intelligence services.

Return to Game

Based on James Comey's account, what was the reason for the FBI's lack of direct access to the DNC servers for forensic purposes?

Answer: The DNC denied the FBI's request for direct access.

Explanation: James Comey testified that the FBI's request for direct access to the DNC servers for forensics was denied by the DNC.

Return to Game

Identify the Ukrainian artillery application that CrowdStrike's December 2016 report alleged was compromised by Fancy Bear.

Answer: ArtOS

Explanation: CrowdStrike's December 2016 report claimed Fancy Bear hacked the Ukrainian artillery app named ArtOS.

Return to Game

Which organizations disputed CrowdStrike's assessment concerning Ukrainian artillery losses attributed to Russian hacking?

Answer: The International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense

Explanation: Both the International Institute for Strategic Studies (IISS) and the Ukrainian Ministry of Defense rejected CrowdStrike's assessment regarding Ukrainian artillery losses due to Russian hacking.

Return to Game