Title | Cyberark Quiz |
---|---|
Course | IT Applications |
Institution | Western Governors University |
Pages | 18 |
File Size | 1.3 MB |
File Type | |
Total Downloads | 37 |
Total Views | 125 |
CyberArk Certification...
False
True
True
Elevated personal user accounts, Shared privileged accounts & application accounts.
True
Privileged accounts allow the attackers breach the permiter, each account can provide full access to a particular asset or application and a single account often provide administrative privileges on multiple assets.
False
Don’t trust the display name, hover over links to see the full URL
Privileges needed to encrypt files are admin user privileges, polymorphic malware helps attackers evade detection.
Malicious Insiders
Retrieve the DC password
Unintentional Insiders
Spear-phishing method
Unintentional Insiders
Application accounts
True
Service account
Malicious Insiders
Ransomware needs Privileged Accounts to be successful, Ransomware is a type of Malware.
Sensitive data that the organization should protect
False
Unintentional Insiders
Unintentional Insiders
Less employees than privileged users
Application accounts
No
Local Admin Accounts
Service account
External Reconnaissance
Polymorphic malware helps attackers evade detection, Privileges needed to encrypt files are admin user privileges
Malicious Insiders
True
The attack is persistent, and the attackers coordinate activities to stay undetected.
Employees can take their laptops home, Enterprise open their network to partners and contractors to provide access to business-critical resources, many organization have adopted the cloud infrastructure and social media platforms to conduct and facilitate business.
True
Zero-day Attacks
Red Team & IR Experience
Unintentional Insiders
Spear-phishing method
Prevent Credential Theft, Stop Lateral & Vertical Movement, Limit Privileges Escalation & Abuse....