Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Python for Command-and-control, Exfiltration and Impact Coursera Quiz Answers

Get Python for Command-and-control, Exfiltration and Impact Coursera Quiz Answers

This course covers python for Command-and-control, Exfiltration and Impact.

Enroll on Coursera

Week 1: Python for command-and-control

Quiz: Python for Command-and-control

Q1. Which of the following Techniques likely requires malware analysis to overcome? Choose all that apply.

  • Encrypted Channel
  • Non-Standard Port
  • Data Encoding
  • Data Obfuscation

Q2. In which of the following cases might it be impossible for a defender to extract all data from recorded C2 traffic?

  • Obfuscated Channel
  • Asymmetric Encrypted Channel
  • Symmetric Encrypted Channel
  • Encoded Channel

Q3. TRUE or FALSE: Certain network protocols are better suited to protocol tunneling than others.

  • True
  • False

Q4. Which Python library is a good choice for an HTTP-based protocol tunneling client?

  • requests
  • responses
  • httpserver
  • httpclient

Q5. Which data can be publicly shared between the client and the server for a AES-encrypted channel using CBC mode. Choose all that apply.

  • Encryption key
  • Encryption algorithm
  • Seed
  • Initialization vector

Q6. TRUE or FALSE: AES encrypted channels can only be decrypted with knowledge of the secret key.

  • True
  • False

Week 2: Python for exfiltration

Quiz: Python for exfiltration

Q1. Which of the following are examples of Non-Application Layer Protocols? Choose all that apply.

  • ICMP
  • TCP
  • SSH
  • DNS

Q2. TRUE or FALSE: A man-in-the-middle attack is essential for DNS-based C2 channel to reach an attacker-controlled server.

  • True
  • False

Q3. TRUE or FALSE: All methods for data exfiltration can be detected by network monitoring tools.

  • True
  • False

Q4. TRUE or FALSE: Ping packets are capable of carrying data and being used for data exfiltration.

  • False
  • True

Q5. Which of the following Techniques can be used to evade threshold-based exfiltration detection methods? Choose all that apply.

  • Scheduled Transfer
  • Transfer Data to Cloud Account
  • Automated Exfiltration
  • Data Transfer Size Limits

Q6. TRUE or FALSE: Data can be transferred within certain fields of a packet with no payload.

  • False
  • True

Week 3: Python for impact

Quiz: Python for impact

Q1. Ransomware can be designed to use which of the following Techniques? Choose all that apply.

  • Inhibit System Recovery
  • Data Destruction
  • Data Encrypted for Impact
  • Firmware Corruption

Q2. TRUE or FALSE: Encryption is vital to ransomware’s ability to monetize an attack.

  • True
  • False

Q3. TRUE or FALSE: Account access removal can be designed to cause permanent or temporary damage.

  • True
  • False

Q4. Which of the following are Python libraries used for account access removal? Choose all that apply.

  • user
  • wmi
  • account
  • pwd

Q5. Ransomware variants that steal data as part of their attacks include Techniques from which of the following Tactics? Choose all that apply.

  • Discovery
  • Reconnaissance
  • Impact
  • Exfiltration

Q6. Which of the following Techniques can cause irreversible damage to a system? Choose all that apply.

  • Network Denial of Service
  • System Shutdown/Reboot
  • Inhibit System Recovery
  • Firmware Corruption

I hope this Python for Command-and-control, Exfiltration and Impact Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *