304 North Cardinal St.
Dorchester Center, MA 02124
This course covers credential Access, discovery, lateral movement & collection.
Q1. TRUE or FALSE: It may be possible to find both the plaintext and hashed version of a user password on a system.
Q2. TRUE or FALSE: It is possible to extract user credentials from Chrome without knowledge of the user’s password.
Q3. TRUE or FALSE: If all traffic is TLS-encrypted, it is impossible to extract credentials from it.
Q4. Which of the following protocols transfer data unencrypted by default? Choose all that apply.
Q5. TRUE or FALSE: Access to user credentials can make an attacker harder to detect on a system.
Q6. TRUE or FALSE: Theft of user credentials enables an attacker to monetize their attack.
Q1. TRUE or FALSE: An attacker can collect most of the data required for an attack from outside of an organization’s network.
Q2. TRUE or FALSE: Network segmentation may force an attacker to perform discovery multiple times through the course of an attack.
Q3. TRUE or FALSE: An attacker’s discovery efforts for lateral movement should be limited to the systems inside an organization’s network.
Q4. Which of the following commands prints a system’s password policy?
Q5. Which of the following extracts all matching data from a string?
Q6. TRUE or FALSE: An administrator-level account on a machine sets up a user best for expanding their access on the target network.
Q1. Which of the following are Techniques for Lateral Movement? Choose all that apply.
Q2. Which of the following are Remote Services used for Lateral Movement? Choose all that apply.
Q3. A web session cookie is an example of which of the following Lateral Movement Techniques?
Q4. TRUE or FALSE: Registry modification may be needed to enable admin shares on Windows.
Q5. TRUE or FALSE: Access to web cookies can enable authentication to a web application without knowledge of the user’s password.
Q6. The SolarWinds hack took advantage of which of the following Techniques for Lateral Movement?
Q1. TRUE or FALSE: Several Collection Techniques require access to system peripherals.
Q2. The system clipboard is accessible to which applications on Windows?
Q3. Which of the following attacks is modification of data on the clipboard best suited to?
Q4. Data gathered during collection can be used for which of the following purposes?
Q5. Which of the following Techniques has been steadily growing more important and valuable to attackers?
Q6. TRUE or FALSE: Email can be collected from multiple different locations by an attacker.
I hope this Credential Access, discovery, lateral movement & collection Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
More Coding Solutions >>