A security analyst is attempting to utilize the following threat intelligence for developing detection capabilities: APT X's approach to a target would be sending a phishing email to the target after conducting active and passive reconnaissance. Upon successful compromise, APT X conducts internal reconnaissance and attempts to move laterally by utilizing existing resources. When APT X finds data that aligns to its objectives, it stages and then exfiltrates data sets in sizes that can range from 1GB to 5GB. APT X also establishes several backdoors to maintain a C2 presence in the environment. In which of the following phases in this APT MOST likely to leave discoverable artifacts?
A) Data collection/exfiltration
B) Defensive evasion
C) Lateral movement
D) Reconnaissance
Correct Answer:
Verified
Q119: A security analyst gathered forensics from a
Q120: Which of the following technologies can be
Q121: The Chief Information Officer (CIO) for a
Q122: A bad actor bypasses authentication and reveals
Q123: A security analyst received a series of
Q125: An executive assistant wants to onboard a
Q126: Which of the following sources would a
Q127: An organization used a third party to
Q128: A custom script currently monitors real-time logs
Q129: A security analyst is investigating malicious traffic
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents