Hello Friends in this article i am gone to share Python for Active Defense by Infosec on Coursera All Weeks Quiz Answer with you..
Python for Active Defense Coursera Quiz Answers
Enroll Link: Python for Active Defense
Decoys Quiz Answers
Question 1)
Which Python library is used for the decoy content demo to access file statistics?
- pathlib
- system
- wmi
- os
Question 2)
Which of the following are advantages of decoys and deception for active defense?
- Wasting attacker’s time
- Intelligence about attacker’s TTPs
- Simplified threat detection
- Control over attacker’s actions
- All of these
Question 3)
The decoy process used to simulate security software used which Python library to detect attacks?
- signal
- wmi
- system
- os
Question 4)
The server used in the decoy credentials demo provided which advantages? Choose all that apply.
- Allowed attacker access to a decoy system
- Seeded credentials in decoy locations
- Provided information about compromised systems
- Made credentials look legitimate
Question 5
This course demonstrated the use of which types of decoys for active defense? Choose all that apply.
- Decoy account
- Decoy content
- Decoy credentials
- Decoy process
Question 6
TRUE or FALSE: Decoy content can be placed on legitimate and decoy systems alike.
- True
- False
Network Quiz Answers
Question 1)
TRUE or FALSE: Analysis of the traffic from the burn-in Python script reveals that it is all to the same four webpages.
- True
- False
Question 2)
The protocol decoder demo works on which types of encoding algorithms?
- ASCII encoding
- URL encoding
- AES encoding
- Base64-encoding
Question 3)
The PCAP collection script is designed to collect which types of traffic?
- Traffic involved in a data breach
- Traffic to decoy systems and services
- Traffic carrying data in non-application protocols
- Traffic carrying obfuscated data
Question 4)
The burn-in Python script creates which types of decoy content?
- Downloaded files
- Network traffic
- Browser artifacts
- Browser cookies
Question 5)
TRUE or FALSE: Defenders can develop protocol decoders to unpack malwares’ custom C2 communications.
- True
- False
Question 6)
TRUE or FALSE: The PCAP collection script is designed to work only with processes running on decoy systems.
- True
- False
Monitoring Quiz Answers
Question 1)
TRUE or FALSE: The effectiveness of the Python code in the system activity monitoring demo is based on an attacker guessing the password incorrectly multiple times.
- True
- False
Question 2)
Which of the following should involve a client sending more data than a server?
- DNS Query
- HTTP GET
- HTTP PUT
- DNS Response
Question 3)
Which Python library could be used to detect abnormal process trees in Windows?
- wmi
- os
- psutil
- system
Question 4)
TRUE or FALSE: Anomalous traffic on a network is an indication of a malware infection.
- True
- False
Question 5)
The system activity monitoring demonstration used which of the following data sources?
- Process data
- Event logs
- File system
- Network traffic
Question 6)
Behavioral analysis can be used to detect anomalies in which of the following?
- User behavior
- Network traffic
- Application behavior
- Resource usage
- All of these