304 North Cardinal St.
Dorchester Center, MA 02124
This course covers python for Command-and-control, Exfiltration and Impact.
Q1. Which of the following Techniques likely requires malware analysis to overcome? Choose all that apply.
Q2. In which of the following cases might it be impossible for a defender to extract all data from recorded C2 traffic?
Q3. TRUE or FALSE: Certain network protocols are better suited to protocol tunneling than others.
Q4. Which Python library is a good choice for an HTTP-based protocol tunneling client?
Q5. Which data can be publicly shared between the client and the server for a AES-encrypted channel using CBC mode. Choose all that apply.
Q6. TRUE or FALSE: AES encrypted channels can only be decrypted with knowledge of the secret key.
Q1. Which of the following are examples of Non-Application Layer Protocols? Choose all that apply.
Q2. TRUE or FALSE: A man-in-the-middle attack is essential for DNS-based C2 channel to reach an attacker-controlled server.
Q3. TRUE or FALSE: All methods for data exfiltration can be detected by network monitoring tools.
Q4. TRUE or FALSE: Ping packets are capable of carrying data and being used for data exfiltration.
Q5. Which of the following Techniques can be used to evade threshold-based exfiltration detection methods? Choose all that apply.
Q6. TRUE or FALSE: Data can be transferred within certain fields of a packet with no payload.
Q1. Ransomware can be designed to use which of the following Techniques? Choose all that apply.
Q2. TRUE or FALSE: Encryption is vital to ransomware’s ability to monetize an attack.
Q3. TRUE or FALSE: Account access removal can be designed to cause permanent or temporary damage.
Q4. Which of the following are Python libraries used for account access removal? Choose all that apply.
Q5. Ransomware variants that steal data as part of their attacks include Techniques from which of the following Tactics? Choose all that apply.
Q6. Which of the following Techniques can cause irreversible damage to a system? Choose all that apply.
I hope this Python for Command-and-control, Exfiltration and Impact Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
More Coding Solutions >>