How to monitor Windows to prevent credential theft attacks

How to monitor Windows to prevent credential theft attacks

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses credential harvesting, focusing on W Digest and its vulnerabilities. It highlights the TrickBot malware, which exploits W Digest to capture credentials. The speaker emphasizes the importance of setting registry keys to prevent unauthorized access, even on newer Windows versions. Proactive measures, such as monitoring registry keys and using group policies, are recommended to secure systems against potential threats.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the methods used for credential harvesting discussed in the video?

Phishing

Keylogging

Social Engineering

W Digest

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the primary goal of the Trick Bot malware as mentioned in the video?

To encrypt files for ransom

To steal usernames and passwords

To delete system files

To install adware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did Trick Bot manage to capture user credentials?

By disabling antivirus software

By re-enabling digest support

By sending phishing emails

By exploiting a browser vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What proactive measure is recommended to prevent attackers from re-enabling W Digest?

Installing a firewall

Setting and monitoring registry keys

Disabling internet access

Updating antivirus software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool can be used to ensure registry settings are correct?

Disk Cleanup

System Restore

Group Policy

Task Manager