#cybersecurity #coursera #quiz #solution #network
#infosec
Correct
Correct
Hide Artifacts, Masquerading and Valid Accounts are largely passive defense evasion techniques focused on concealment.
Correct
Correct
Correct
Weaken Encryption and Group Policy Modification are Defense Evasion Techniques that try to undermine the effectiveness of defenses.
Correct
Disabling AVs, deleting logs and similar techniques can be effective at blinding defenders.
Correct
The Equifax attackers deleted log files, which is part of the Indicator Removal on Host Technique.
Correct
Hidden files are visible to antiviruses and similar programs.
Correct
The standard dir command does not show alternate data streams if no flags are used.
Comments