#cybersecurity #coursera #quiz #solution #network
Correct
An attacker may interact with target systems during Reconnaissance as well.
Correct
Attacks like SQL injection may incorporate several stages into a single step.
Correct
External Remote Services, Hardware Additions and Supply Chain Compromise are Techniques for initial access.
Correct
Correct
Incorrect
Correct
Removable media bypasses perimeter-based and network-level defenses.
Correct
User credentials can be compromised in many ways, providing an attacker access to a valid user account.
Comments