Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- What was the persistence technique observed in the example in this chapter?
a. Attributes
b. Scheduled task
c. Deleting files
d. Running in memory
- What was the defense evasion technique observed in the example in this chapter?
a. Scheduled task
b. Deleting files
c. Setting attributes
d. Running as SYSTEM
- What is an EICAR file?
a. A harmless anti-virus test file
b. A process hooking technique
c. A memory injection tool
d. A Kibana template
- What do Actions in Task Scheduler show us?
a. Who to run the scheduled task as
b. Who to connect to and report the status of the scheduled task
c. When a scheduled task runs
d. What the scheduled task does
- How do you remove a hidden attribute from a file?
a. attrib -h
b. attrib +h
c. attrib -d
d. attrib -all