ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 12 - H12-724 discussion

Report
Export

In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?

A.
Long-term latency and collection of key data.
Answers
A.
Long-term latency and collection of key data.
B.
Leak the acquired key data information to a third party of interest 155955cc-666171a2-20fac832-0c042c044
Answers
B.
Leak the acquired key data information to a third party of interest 155955cc-666171a2-20fac832-0c042c044
C.
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
Answers
C.
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
D.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
Answers
D.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
Suggested answer: D
asked 18/09/2024
mahdis khaledi
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first