Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion.
Q1. TRUE or FALSE: All cyberattacks require malicious code execution on a target system.
Q2. Which of the following are examples of Techniques for execution? Choose all that apply.
Q3. Which of the following are examples of Sub-Techniques for user execution? Choose all that apply.
Q4. TRUE or FALSE: Scheduled execution can be used to execute fileless malware as well as file-based malware.
Q5. TRUE or FALSE: The term “execution” is limited to running a malicious executable on a target system.
Q6. TRUE or FALSE: Python can be used to build a phishing website.
Q1. TRUE or FALSE: Registry autorun is limited to system processes.
Q2. TRUE or FALSE: The system path defines the order in which the system searches for a file to execute.
Q3. TRUE or FALSE: Compromised user accounts are a potential persistence mechanism for an attacker.
Q4. Which registry hives contain autorun keys? Choose all that apply.
Q5. TRUE or FALSE: DLL search order hijacking allows an attacker to achieve persistence on a system.
Q6. Which of the following Persistence Techniques could grant an attacker SYSTEM permissions? Choose all that apply.
Q1. Can Python libraries be used for privilege escalation?
Q2. TRUE or FALSE: Most attack vectors do not give an attacker the access that they need to achieve their goals.
Q3. Which of the following can be used for both persistence and privilege escalation? Choose all that apply.
Q4. TRUE or FALSE: Third-party dependencies in applications can be exploited for privilege escalation.
Q5. Where does Python look first for a library to import?
Q6. What privilege level do processes executed at boot time have?
Q1. Which of the following are largely passive defense evasion Techniques focused on concealment? Choose all that apply.
Q2. Which of the following Defense Evasion Techniques try to undermine the effectiveness of defenses? Choose all that apply.
Q3. TRUE or FALSE: Active defense evasion techniques can be effective even if they cause the intrusion to be detected.
Q4. Which of the following Defense Evasion Techniques was used in the Equifax hack?
Q5. TRUE or FALSE: Hidden files are invisible to antiviruses and similar programs.
Q6. TRUE or FALSE: The standard dir command shows alternate data streams with no flags.
I hope this Execution, persistence, privilege escalation and evasion Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>