ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 56 - SPLK-5001 discussion

Report
Export

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

A.
Tactic
Answers
A.
Tactic
B.
Policy
Answers
B.
Policy
C.
Procedure
Answers
C.
Procedure
D.
Technique
Answers
D.
Technique
Suggested answer: D
asked 23/09/2024
shvoal gerama
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first