List of questions
Related questions
Question 135 - H12-724 discussion
With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.
Generally, APT attacks can be summarized into four stages:
A.
Collecting Information & Intrusion
B.
Long-term lurking & mining
C.
Data breach
D.
Remote control and penetrationRegarding the order of these four stages, which of the following options is correct?
E.
2-3-4-1
F.
1-2-4-3
G.
1-4-2-3
H.
2-1-4-3
Your answer:
0 comments
Sorted by
Leave a comment first