Answers
Which Shield tactic has the most techniques? Detect
Is the technique 'Decoy Credentials' listed under the tactic from question #1? (Yay/Nay) Yay
Explore DTE0011, what is the ID for the use case where a defender can plant artifacts on a system to make it look like a virtual machine to the adversary? DUC0234
Based on the above use case, what is its ATT&CK® Technique mapping? T1497
Continuing from the previous question, look at the information for this ATT&CK® Technique, what 2 programs are listed that adversary's will check for? Sysinternals and Wireshark
Last updated
Was this helpful?