1.Why does Windows cache credentials in the LSASS process?
2.What privilege level is required to extract credentials from LSASS?
3.Why does who has logged into a system determine the value of LSASS extraction?
4.What is Credential Guard, and how does it affect LSASS extraction?
5.Why is tiered administration a more architectural defense than endpoint protection alone?
6.What types of credential material can LSASS contain?