ExamGecko
Question list
Search
Search

Question 31 - PCDRA discussion

Report
Export

Phishing belongs to which of the following MITRE ATT&CK tactics?

A.
Initial Access, Persistence
Answers
A.
Initial Access, Persistence
B.
Persistence, Command and Control
Answers
B.
Persistence, Command and Control
C.
Reconnaissance, Persistence
Answers
C.
Reconnaissance, Persistence
D.
Reconnaissance, Initial Access
Answers
D.
Reconnaissance, Initial Access
Suggested answer: D

Explanation:

Phishing is a technique that belongs to two MITRE ATT&CK tactics: Reconnaissance and Initial Access. Reconnaissance is the process of gathering information about a target before launching an attack. Phishing for information is a sub-technique of Reconnaissance that involves sending phishing messages to elicit sensitive information that can be used during targeting. Initial Access is the process of gaining a foothold in a network or system. Phishing is a sub-technique of Initial Access that involves sending phishing messages to execute malicious code on victim systems. Phishing can be used for both Reconnaissance and Initial Access depending on the objective and content of the phishing message.Reference:

Phishing, Technique T1566 - Enterprise | MITRE ATT&CK1

Phishing for Information, Technique T1598 - Enterprise | MITRE ATT&CK2

Phishing for information, Part 2: Tactics and techniques3

PHISHING AND THE MITREATT&CK FRAMEWORK - EnterpriseTalk4

Initial Access, Tactic TA0001 - Enterprise | MITRE ATT&CK5

asked 23/09/2024
Manuela Kays
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first