Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which filesystems are supported by Alternate Data Streams (ADSes)?
- VHD
- FAT32
- NTFS
- CDFS
- What utility can be used to stop the auditing or logging of events?
- Auditpol
- ADS
- Regedit
- NTFS
- An attacker adding higher privileges to their account (adding themselves to the administrators group) is called what?
- Trinity slide
- Vertical escalation
- Sideloading
- Pass the hash
- Clark brings in a new keyboard to work and gives it to Lois; soon after, Lois's credentials are being used on other systems. What do you suspect is the cause?
- A keylogger
- Malware
- MFA attacks
- Ransomware