#cybersecurity #coursera #quiz #solution #network #infosec 1 . Question 1 Which of the following are largely passive defense evasion Techniques focused on concealment? Choose all that apply. 1 / 1 point Subvert Trust Controls Masquerading Correct Hide Artifacts Correct Hide Artifacts, Masquerading and Valid Accounts are largely passive defense evasion techniques focused on concealment. Valid Accounts Correct 2 . Question 2 Which of the following Defense Evasion Techniques try to undermine the effectiveness of defenses? Choose all that apply. 1 / 1 point Traffic Signaling Group Policy Modification Correct Weaken Encryption Correct Weaken Encryption and Group Policy Modification are Defense Evasion Techniques that try to undermine the effectiveness of defenses. Rogue Domain Controller 3 . Question 3 TRUE or FALSE: Active defense evasion techniques can be effective even if they cause the intrusion to be detected. 1 / 1 point False True...
knowledge, Tutorials, information, programming, JAVA, CISCO,Python,Excel,source,codes,theory