ExamGecko
Question list
Search
Search

Related questions











Question 237 - 312-50v12 discussion

Report
Export

At what stage of the cyber kill chain theory model does data exfiltration occur?

A.
Actions on objectives
Answers
A.
Actions on objectives
B.
Weaponization
Answers
B.
Weaponization
C.
installation
Answers
C.
installation
D.
Command and control
Answers
D.
Command and control
Suggested answer: A

Explanation:

The longer an adversary has this level of access, the greater the impact. Defenders must detect this stage as quickly as possible and deploy tools which can enable them to gather forensic evidence. One example would come with network packet captures, for damage assessment. Only now, after progressing through the primary six phases, can intruders take actions to realize their original objectives. Typically, the target of knowledge exfiltration involves collecting, encrypting and extracting information from the victim(s) environment; violations of knowledge integrity or availability are potential objectives also . Alternatively, and most ordinarily , the intruder may only desire access to the initial victim box to be used as a hop point to compromise additional systems and move laterally inside the network. Once this stage is identified within an environment, the implementation of prepared reaction plans must be initiated. At a minimum, the plan should include a comprehensive communication plan, detailed evidence must be elevated to the very best ranking official or board , the deployment of end-point security tools to dam data loss and preparation for briefing a CIRT Team.

Having these resources well established beforehand may be a "MUST" in today's quickly evolving landscape of cybersecurity threats

asked 18/09/2024
Martin Gucký
51 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first