PrepAway - Latest Free Exam Questions & Answers

Which of the following is this an example of?

After analyzing and correlating activity from multiple sensors, the security administrator has
determined that a group of very well organized individuals from an enemy country is
responsible for various attempts to breach the company network, through the use of very
sophisticated and targeted attacks. Which of the following is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
Privilege escalation

B.
Advanced persistent threat

C.
Malicious insider threat

D.
Spear phishing

One Comment on “Which of the following is this an example of?

  1. meac says:

    A very long winded question ( quite a mouth fill) to say that
    • Enemy hackers
    • Persistently
    • Attempt to breach security meassures

    The answer tankflully is quite clear.
    This is an attack = Threat
    It is well organized= Advance
    It has been many in number = Persistent

    So we have an “Advanced Persisten threat” (APT) which is actually a security terminology

    Definitions of precisely what an APT is can vary widely, but can best be summarized by their named requirements:
    Advanced Criminal operators behind the threat utilize the full spectrum of computer intrusion technologies and techniques.
    While individual components of the attack may not be classed as particularly “advanced” (e.g. malware components generated from commonly available DIY construction kits, or the use of easily procured exploit materials), their operators can typically access and develop more advanced tools as required.
    They combine multiple attack methodologies and tools in order to reach and compromise their target.
    Persistent Criminal operators give priority to a specific task, rather than opportunistically seeking immediate financial gain. This distinction implies that the attackers are guided by external entities.
    The attack is conducted through continuous monitoring and interaction in order to achieve the defined objectives. It does not mean a barrage of constant attacks and malware updates. In fact, a
    “low-and-slow” approach is usually more successful.
    Threat means that there is a level of coordinated human involvement in the attack, rather than a mindless and automated piece of code. The criminal operators have a specific objective and are skilled, motivated, organized and well funded




    0



    0

Leave a Reply