Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Execution, persistence, privilege escalation and evasion Coursera Quiz Answers

Get Execution, persistence, privilege escalation and evasion Coursera Quiz Answers

This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion.

Enroll on Coursera

Week 1: Python for execution

Quiz: Python for Execution

Q1. TRUE or FALSE: All cyberattacks require malicious code execution on a target system.

  • True
  • False

Q2. Which of the following are examples of Techniques for execution? Choose all that apply.

  • All of these
  • User execution
  • Native API
  • System services
  • Command and Scripting interpreter

Q3. Which of the following are examples of Sub-Techniques for user execution? Choose all that apply.

  • Malicious File
  • Removable media
  • Valid accounts
  • Malicious Link

Q4. TRUE or FALSE: Scheduled execution can be used to execute fileless malware as well as file-based malware.

  • False
  • True

Q5. TRUE or FALSE: The term “execution” is limited to running a malicious executable on a target system.

  • False
  • True

Q6. TRUE or FALSE: Python can be used to build a phishing website.

  • False
  • True

Week 2: Python for persistence

Quiz: Python for persistence

Q1. TRUE or FALSE: Registry autorun is limited to system processes.

  • False
  • True

Q2. TRUE or FALSE: The system path defines the order in which the system searches for a file to execute.

  • True
  • False

Q3. TRUE or FALSE: Compromised user accounts are a potential persistence mechanism for an attacker.

  • True
  • False

Q4. Which registry hives contain autorun keys? Choose all that apply.

  • HKCU
  • HKLM
  • HKCR
  • HKCC

Q5. TRUE or FALSE: DLL search order hijacking allows an attacker to achieve persistence on a system.

  • False
  • True

Q6. Which of the following Persistence Techniques could grant an attacker SYSTEM permissions? Choose all that apply.

  • Create or Modify System Process
  • Boot or Logon Autostart Execution
  • Traffic Signaling
  • Valid Accounts

Week 3: Python for privilege escalation

Quiz: Python for privilege escalation

Q1. Can Python libraries be used for privilege escalation?

  • No, modifying Python libraries requires administrator access.
  • Yes, all Python code is run with administrator access.
  • Yes, Python code can be run with elevated privileges.
  • No, Python libraries are imported with minimal permissions.

Q2. TRUE or FALSE: Most attack vectors do not give an attacker the access that they need to achieve their goals.

  • False
  • True

Q3. Which of the following can be used for both persistence and privilege escalation? Choose all that apply.

  • Boot or Logon Autostart
  • Event-Triggered Execution
  • Valid Accounts
  • Access Token Manipulation

Q4. TRUE or FALSE: Third-party dependencies in applications can be exploited for privilege escalation.

  • False
  • True

Q5. Where does Python look first for a library to import?

  • Directory of calling program
  • Top of system path
  • Python install directory
  • Python scripts directory

Q6. What privilege level do processes executed at boot time have?

  • Administrator
  • Guest
  • SYSTEM
  • User

Week 4: Python for defense evasion

Quiz: Python for defense evasion

Q1. Which of the following are largely passive defense evasion Techniques focused on concealment? Choose all that apply.

  • Hide Artifacts
  • Subvert Trust Controls
  • Masquerading
  • Valid Accounts

Q2. Which of the following Defense Evasion Techniques try to undermine the effectiveness of defenses? Choose all that apply.

  • Rogue Domain Controller
  • Group Policy Modification
  • Traffic Signaling
  • Weaken Encryption

Q3. TRUE or FALSE: Active defense evasion techniques can be effective even if they cause the intrusion to be detected.

  • True
  • False

Q4. Which of the following Defense Evasion Techniques was used in the Equifax hack?

  • Indirect Command Execution
  • Indicator Removal on Host
  • Modify System Image
  • Deobfuscate/Decode Files or Information

Q5. TRUE or FALSE: Hidden files are invisible to antiviruses and similar programs.

  • False
  • True

Q6. TRUE or FALSE: The standard dir command shows alternate data streams with no flags.

  • False
  • True
Conclusion:

I hope this Execution, persistence, privilege escalation and evasion Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *