ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 23 - SY0-601 discussion

Report
Export

A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims. Which of the following is the researcher MOST likely using?

A.
The Diamond Model of Intrusion Analysis
Answers
A.
The Diamond Model of Intrusion Analysis
B.
The Cyber Kill Chain
Answers
B.
The Cyber Kill Chain
C.
The MITRE CVE database
Answers
C.
The MITRE CVE database
D.
The incident response process
Answers
D.
The incident response process
Suggested answer: A

Explanation:

The Diamond Model is a framework for analyzing cyber threats that focuses on four key elements:

adversary, capability, infrastructure, and victim. By analyzing these elements, security researchers can gain a better understanding of the threat landscape and develop more effective security strategies.

asked 02/10/2024
Liam Derwin
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first