Questions
You can test your knowledge of the topics covered in this chapter with the following questions. The answers can be found at the end of the book.
- Which of these techniques is an example of the privilege escalation tactic?
- Domain policy modification
- Use of an alternate authentication method
- Email collection
- Phishing for information
- Which of the following is not a principle of Microsoft’s Zero Trust guidance?
- Use least privileged access
- Assume breach
- Decommission network perimeters
- Verify explicitly
- Which of the following refers to an approach attackers can use to avoid installing their own malware and, instead, leverage built-in capabilities?
- lolcat
- lolbin
- lolsys
- lolwin
- According to a 2021 IBM Security report, how many days, on average, did it take for a cybersecurity breach to be identified?
- 31
- 90
- 182
- 212
- What are the risks of Remote Desktop Protocol (RDP) being exposed over the internet? Choose all that apply.
- Credentials might have leaked online.
- RDP is inherently an insecure protocol.
- Authentication might be protected with only a single factor of authentication.
- CredSSP does not support encrypting credentials over the internet.