#cybersecurity #coursera #quiz #solution #network
#infosec
Hide Artifacts, Masquerading and Valid Accounts are largely passive defense evasion techniques focused on concealment.
Weaken Encryption and Group Policy Modification are Defense Evasion Techniques that try to undermine the effectiveness of defenses.
Disabling AVs, deleting logs and similar techniques can be effective at blinding defenders.
The Equifax attackers deleted log files, which is part of the Indicator Removal on Host Technique.
Hidden files are visible to antiviruses and similar programs.
The standard dir command does not show alternate data streams if no flags are used.
Comments