Python for Active Defense Coursera Quiz Answers

Hello Friends in this article i am gone to share Python for Active Defense by Infosec on Coursera All Weeks Quiz Answer with you..

Python for Active Defense Coursera Quiz Answers

Enroll Link: Python for Active Defense

 

Decoys Quiz Answers

Question 1)
Which Python library is used for the decoy content demo to access file statistics?

  • pathlib
  • system
  • wmi
  • os

Question 2)
Which of the following are advantages of decoys and deception for active defense?

  • Wasting attacker’s time
  • Intelligence about attacker’s TTPs
  • Simplified threat detection
  • Control over attacker’s actions
  • All of these

Question 3)
The decoy process used to simulate security software used which Python library to detect attacks?

  • signal
  • wmi
  • system
  • os

Question 4)
The server used in the decoy credentials demo provided which advantages? Choose all that apply.

  • Allowed attacker access to a decoy system
  • Seeded credentials in decoy locations
  • Provided information about compromised systems
  • Made credentials look legitimate

Question 5
This course demonstrated the use of which types of decoys for active defense? Choose all that apply.

  • Decoy account
  • Decoy content
  • Decoy credentials
  • Decoy process

Question 6
TRUE or FALSE: Decoy content can be placed on legitimate and decoy systems alike.

  • True
  • False

 

Network Quiz Answers

Question 1)
TRUE or FALSE: Analysis of the traffic from the burn-in Python script reveals that it is all to the same four webpages.

  • True
  • False

Question 2)
The protocol decoder demo works on which types of encoding algorithms?

  • ASCII encoding
  • URL encoding
  • AES encoding
  • Base64-encoding

Question 3)
The PCAP collection script is designed to collect which types of traffic?

  • Traffic involved in a data breach
  • Traffic to decoy systems and services
  • Traffic carrying data in non-application protocols
  • Traffic carrying obfuscated data

Question 4)
The burn-in Python script creates which types of decoy content?

  • Downloaded files
  • Network traffic
  • Browser artifacts
  • Browser cookies

Question 5)
TRUE or FALSE: Defenders can develop protocol decoders to unpack malwares’ custom C2 communications.

  • True
  • False

Question 6)
TRUE or FALSE: The PCAP collection script is designed to work only with processes running on decoy systems.

  • True
  • False

 

Monitoring Quiz Answers

Question 1)
TRUE or FALSE: The effectiveness of the Python code in the system activity monitoring demo is based on an attacker guessing the password incorrectly multiple times.

  • True
  • False

Question 2)
Which of the following should involve a client sending more data than a server?

  • DNS Query
  • HTTP GET
  • HTTP PUT
  • DNS Response

Question 3)
Which Python library could be used to detect abnormal process trees in Windows?

  • wmi
  • os
  • psutil
  • system

Question 4)
TRUE or FALSE: Anomalous traffic on a network is an indication of a malware infection.

  • True
  • False

Question 5)
The system activity monitoring demonstration used which of the following data sources?

  • Process data
  • Event logs
  • File system
  • Network traffic

Question 6)
Behavioral analysis can be used to detect anomalies in which of the following?

  • User behavior
  • Network traffic
  • Application behavior
  • Resource usage
  • All of these

 

 

Leave a Comment