Introduction to Python for Cybersecurity Coursera Quiz Answers

Get Introduction to Python for Cybersecurity Coursera Quiz Answers

This course it the first part of the Python for Cybersecurity Specialization. Learners will get an introduction and overview of the course format and learning objectives.

Enroll on Coursera

Week 1: Introduction to Python for Cybersecurity

Quiz: Python for Cybersecurity

Q1. Which of the following is the top level of organization in MITRE ATT&CK?

  • Procedure
  • Technique
  • Tactic
  • Objective

Q2. John the Ripper would be an example of which of the following in MITRE ATT&CK?

  • Tactic
  • Procedure
  • Technique
  • Tool

Q3. Which of the following is a PRE-ATT&CK Tactic?

  • Discovery
  • Execution
  • Resource Development
  • Collection

Q4. TRUE or FALSE: A cyber threat actor will use at least one Technique from every Tactic during a cyberattack.

  • True
  • False

Week 2: Python for PRE-ATT&CK

Quiz: Python for PRE-ATT&CK

Q1. TRUE or FALSE: PRE-ATT&CK has always been part of the MITRE ATT&CK Enterprise Matrix.

  • True
  • False

Q2. Which of the following are Techniques under the Reconnaissance Tactic in MITRE ATT&CK? Choose all that apply.

  • Establish Accounts
  • Develop Capabilities
  • Active Scanning
  • Phishing for Information

Q3. TRUE or FALSE: The Python demonstrations for PRE-ATT&CK focus on the Reconnaissance phase of the MITRE ATT&CK framework.

  • True
  • False

Q4. Which of the following are open technical databases that can be used for reconnaissance? Choose all that apply.

  • DNS
  • CDNs
  • WHOIS
  • Websites

Q5. Which of the following are examples of activities that could be performed during network scanning? Choose all that apply.

  • Vulnerability scanning
  • Banner grabbing
  • DNS enumeration
  • Port scanning

Week 3: Python for Initial Access

Quiz: Python for Initial Access

Q1. TRUE or FALSE: The Initial Access stage is always the first time that an attacker interacts with a target’s systems.

  • True
  • False

Q2. TRUE or FALSE: The Initial Access stage can blur into other stages of the attack life cycle.

  • True
  • False

Q3. Which of the following are techniques for initial access? Choose all that apply.

  • External Remote Services
  • Supply Chain Compromise
  • Hardware Additions
  • Hijack Execution Flow

Q4. Why is USB autorun not always a viable infection vector for Windows?

  • Not all Windows versions support Autorun
  • Autorun is disabled by default in Windows 10
  • Autorun is a Linux concept
  • Autorun is always a viable attack vector

Q5. Which of the following is an initial access Technique that bypasses many organizations’ defenses?

  • Phishing
  • Exploit Public-Facing Application
  • Drive-by Compromise
  • Replication Through Removable Media

Q6. TRUE or FALSE: Valid accounts are a relatively easy attack vector for an attacker to exploit.

  • True
  • False
Conclusion:

I hope this Introduction to Python for Cybersecurity Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published.