Credential Access, discovery, lateral movement & collection Coursera Quiz Answers

Get Credential Access, discovery, lateral movement & collection Coursera Quiz Answers

This course covers credential Access, discovery, lateral movement & collection.

Enroll on Coursera

Week 1: Python for credential access

Quiz: Python for credential access

Q1. TRUE or FALSE: It may be possible to find both the plaintext and hashed version of a user password on a system.

  • False
  • True

Q2. TRUE or FALSE: It is possible to extract user credentials from Chrome without knowledge of the user’s password.

  • False. The password is needed to decrypt the credentials
  • False. Chrome only stores password hashes
  • True. Only access to the user account is required
  • True. Chrome stores passwords unencrypted

Q3. TRUE or FALSE: If all traffic is TLS-encrypted, it is impossible to extract credentials from it.

  • False
  • True

Q4. Which of the following protocols transfer data unencrypted by default? Choose all that apply.

  • SMTP
  • SFTP
  • DNS
  • FTP

Q5. TRUE or FALSE: Access to user credentials can make an attacker harder to detect on a system.

  • True
  • False

Q6. TRUE or FALSE: Theft of user credentials enables an attacker to monetize their attack.

  • False
  • True

Week 2: Python for Discovery

Quiz: Python for Discovery

Q1. TRUE or FALSE: An attacker can collect most of the data required for an attack from outside of an organization’s network.

  • False
  • True

Q2. TRUE or FALSE: Network segmentation may force an attacker to perform discovery multiple times through the course of an attack.

  • False
  • True

Q3. TRUE or FALSE: An attacker’s discovery efforts for lateral movement should be limited to the systems inside an organization’s network.

  • True
  • False

Q4. Which of the following commands prints a system’s password policy?

  • net users
  • net policy
  • net accounts
  • net passwords

Q5. Which of the following extracts all matching data from a string?

  • re.search
  • re.matchall
  • re.extractall
  • re.findall

Q6. TRUE or FALSE: An administrator-level account on a machine sets up a user best for expanding their access on the target network.

  • True
  • False

Week 3: Python for Lateral Movement

Quiz: Python for Lateral Movement

Q1. Which of the following are Techniques for Lateral Movement? Choose all that apply.

  • Remote Services
  • Boot and Logon Autostart
  • External Remote Services
  • Software Deployment Tools

Q2. Which of the following are Remote Services used for Lateral Movement? Choose all that apply.

  • VPN
  • SSH
  • RDP
  • VNC
  • SMB

Q3. A web session cookie is an example of which of the following Lateral Movement Techniques?

  • Remote Service Session Hijacking
  • Exploitation of Remote Services
  • Remote Services
  • Alternative Authentication Material

Q4. TRUE or FALSE: Registry modification may be needed to enable admin shares on Windows.

  • True
  • False

Q5. TRUE or FALSE: Access to web cookies can enable authentication to a web application without knowledge of the user’s password.

  • True
  • False

Q6. The SolarWinds hack took advantage of which of the following Techniques for Lateral Movement?

  • Lateral Tool Transfer
  • Taint Shared Content
  • Internal Spearphishing
  • Software Deployment Tools

Week 4: Python for Collection

Quiz: Python for collection

Q1. TRUE or FALSE: Several Collection Techniques require access to system peripherals.

  • False
  • True

Q2. The system clipboard is accessible to which applications on Windows?

  • Those the user granted access to
  • System applications
  • All of these
  • Text-processing applications

Q3. Which of the following attacks is modification of data on the clipboard best suited to?

  • Financial fraud
  • Ransomware
  • Data breach
  • Clickjacking

Q4. Data gathered during collection can be used for which of the following purposes?

  • Privilege escalation
  • Social Engineering
  • Data breach
  • All of these
  • Lateral movement

Q5. Which of the following Techniques has been steadily growing more important and valuable to attackers?

  • Data from Cloud Storage Object
  • Archive Collected Data
  • Email Collection
  • Data from Removable Media

Q6. TRUE or FALSE: Email can be collected from multiple different locations by an attacker.

  • False
  • True
Conclusion:

I hope this Credential Access, discovery, lateral movement & collection Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published.