ExamGecko
Question list
Search
Search

Related questions











Question 334 - 312-50v12 discussion

Report
Export

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?

A.
Advanced persistent theft
Answers
A.
Advanced persistent theft
B.
threat Diversion theft
Answers
B.
threat Diversion theft
C.
Spear-phishing sites
Answers
C.
Spear-phishing sites
D.
insider threat
Answers
D.
insider threat
Suggested answer: A

Explanation:

An advanced persistent threat (APT) may be a broad term wont to describe AN attack campaign within which an intruder, or team of intruders, establishes a bootleg, long presence on a network so as to mine sensitive knowledge.

The targets of those assaults, that square measure terribly fastidiously chosen and researched, usually embrace massive enterprises or governmental networks. the implications of such intrusions square measure huge, and include:

Intellectual property thieving (e.g., trade secrets or patents)

Compromised sensitive info (e.g., worker and user personal data) The sabotaging of essential structure infrastructures (e.g., information deletion) Total website takeovers Executing an APT assault needs additional resources than a regular internet application attack. The perpetrators square measure typically groups of intimate cybercriminals having substantial resource.

Some APT attacks square measure government-funded and used as cyber warfare weapons.

APT attacks dissent from ancient internet application threats, in that:

They're considerably additional advanced.

They're not hit and run attacks—once a network is infiltrated, the culprit remains so as to realize the maximum amount info as potential.

They're manually dead (not automated) against a selected mark and indiscriminately launched against an outsized pool of targets.

They typically aim to infiltrate a complete network, as opposition one specific half.

More common attacks, like remote file inclusion (RFI), SQL injection and cross-site scripting (XSS), square measure oftentimes employed by perpetrators to ascertain a footing in a very targeted network. Next, Trojans and backdoor shells square measure typically wont to expand that foothold and make a persistent presence inside the targeted perimeter.

asked 18/09/2024
David Galiata
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first