Download
Security_Operations_7.4_Analyst_Exam_Description.pdf
Question :23
Review the following incident report:
Attackers leveraged a phishing email campaign targeting your employees.
The email likely impersonated a trusted source, such as the IT department, and requested login credentials.
An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).
The RAT provided the attackers with remote access and a foothold in the compromised system.
Which two MITRE ATT&CK tactics does this incident report capture?
(Choose two.)
A. Initial Access
B. Defense Evasion
C. Lateral Movement
D. Persistence
Ans:A,C
[ add comment ] | permalink | print article | related link |




( 2.9 / 7 )

Random Entry