Skip to main content

Posts

Python for Initial Access

 #cybersecurity #coursera #quiz #solution #network  1 . Question 1 TRUE or FALSE: The Initial Access stage is always the first time that an attacker interacts with a target's systems. 1 / 1  point False True Correct An attacker may interact with target systems during Reconnaissance as well. 2 . Question 2 TRUE or FALSE: The Initial Access stage can blur into other stages of the attack life cycle. 1 / 1  point False True Correct Attacks like SQL injection may incorporate several stages into a single step. 3 . Question 3 Which of the following are techniques for initial access? Choose all that apply. 1 / 1  point External Remote Services Correct External Remote Services, Hardware Additions and Supply Chain Compromise are Techniques for initial access. Hardware Additions Correct Supply Chain Compromise Correct Hijack Execution Flow 4 . Question 4 Why is USB autorun not always a viable infection vector for Windows? 0 / 1  point Autorun is disabled by default in Windows 10 Autorun is al

Python for PRE-ATT&CK

  Python for PRE-ATT&CK #cybersecurity #coursera #quiz #solution #network  1 . Question 1 TRUE or FALSE: PRE-ATT&CK has always been part of the MITRE ATT&CK Enterprise Matrix. 1 / 1  point False True Correct PRE-ATT&CK used to be its own standalone matrix. 2 . Question 2 Which of the following are Techniques under the Reconnaissance Tactic in MITRE ATT&CK? Choose all that apply. 1 / 1  point Active Scanning Correct The Reconnaissance stage includes Active Scanning and Phishing for Information. Establish Accounts Phishing for Information Correct Develop Capabilities 3 . Question 3 TRUE or FALSE: The Python demonstrations for PRE-ATT&CK focus on the Reconnaissance phase of the MITRE ATT&CK framework. 1 / 1  point True False Correct The Python demonstrations for PRE-ATT&CK focus on the Reconnaissance phase of the MITRE ATT&CK framework. 4 . Question 4 Which of the following are open technical databases that can be used for reconnaissance? Choose all tha