List of questions
Related questions
Question 12 - H12-724 discussion
In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?
A.
Long-term latency and collection of key data.
B.
Leak the acquired key data information to a third party of interest 155955cc-666171a2-20fac832-0c042c044
C.
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
D.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
Your answer:
0 comments
Sorted by
Leave a comment first