1.What privilege level is required to collect BloodHound data with SharpHound?
2.What makes a BloodHound attack path a 'practical' path versus a 'theoretical' one?
3.Why is marking compromised accounts as 'owned' in BloodHound important during an engagement?
4.What is the core value of BloodHound's transitive control analysis?
5.A colleague presents a BloodHound screenshot showing a path to Domain Admins and says 'this is the finding.' What is wrong with this approach?
6.How would you explain a BloodHound privilege escalation path to a non-technical stakeholder?