Python for Active Defense Coursera Quiz Answers

Get Python for Active Defense Coursera Quiz Answers

This course covers Python for active defense.

Enroll on Coursera

Week 1: Python for active defense: Decoys

Quiz: Decoys

Q1. Which Python library is used for the decoy content demo to access file statistics?

  • os
  • wmi
  • system
  • pathlib

Q2. Which of the following are advantages of decoys and deception for active defense?

  • Control over attacker’s actions
  • All of these
  • Intelligence about attacker’s TTPs
  • Simplified threat detection
  • Wasting attacker’s time

Q3. The decoy process used to simulate security software used which Python library to detect attacks?

  • wmi
  • system
  • signal
  • os

Q4. The server used in the decoy credentials demo provided which advantages? Choose all that apply.

  • Allowed attacker access to a decoy system
  • Provided information about compromised systems
  • Made credentials look legitimate
  • Seeded credentials in decoy locations

Q5. This course demonstrated the use of which types of decoys for active defense? Choose all that apply.

  • Decoy credentials
  • Decoy account
  • Decoy content
  • Decoy process

Q6. TRUE or FALSE: Decoy content can be placed on legitimate and decoy systems alike.

  • False
  • True

Week 2: Python for active defense: Network

Quiz: Network

Q1. TRUE or FALSE: Analysis of the traffic from the burn-in Python script reveals that it is all to the same four webpages.

  • False
  • True

Q2. The protocol decoder demo works on which types of encoding algorithms?

  • URL encoding
  • AES encoding
  • Base64-encoding
  • ASCII encoding

Q3. The PCAP collection script is designed to collect which types of traffic?

  • Traffic to decoy systems and services
  • Traffic carrying data in non-application protocols
  • Traffic carrying obfuscated data
  • Traffic involved in a data breach

Q4. The burn-in Python script creates which types of decoy content?

  • Downloaded files
  • Browser artifacts
  • Browser cookies
  • Network traffic

Q5. TRUE or FALSE: Defenders can develop protocol decoders to unpack malwares’ custom C2 communications.

  • True
  • False

Q6. TRUE or FALSE: The PCAP collection script is designed to work only with processes running on decoy systems.

  • True
  • False

Week 3: Python for active defense: Monitoring

Quiz: Monitoring

Q1. TRUE or FALSE: The effectiveness of the Python code in the system activity monitoring demo is based on an attacker guessing the password incorrectly multiple times.

  • False
  • True

Q2. Which of the following should involve a client sending more data than a server?

  • HTTP PUT
  • DNS Query
  • DNS Response
  • HTTP GET

Q3. Which Python library could be used to detect abnormal process trees in Windows?

  • system
  • wmi
  • os
  • psutil

Q4. TRUE or FALSE: Anomalous traffic on a network is an indication of a malware infection.

  • True
  • False

Q5. The system activity monitoring demonstration used which of the following data sources?

  • Event logs
  • File system
  • Network traffic
  • Process data

Q6. Behavioral analysis can be used to detect anomalies in which of the following?

  • Application behavior
  • Resource usage
  • Network traffic
  • User behavior
  • All of these
Conclusion:

I hope this Python for Active Defense Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published.