PrepAway - Latest Free Exam Questions & Answers

Which of the following is this an example of?

After analyzing and correlating activity from multiple sensors, the security administrator has
determined that a group of very well organized individuals from an enemy country is responsible
for various attempts to breach the company network, through the use of very sophisticated and
targeted attacks. Which of the following is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
Privilege escalation

B.
Advanced persistent threat

C.
Malicious insider threat

D.
Spear phishing

Explanation:
Definitions of precisely what an APT is can vary widely, but can best be summarized by their
named requirements:
Advanced – Criminal operators behind the threat utilize the full spectrum of computer intrusion
technologies and techniques. While individual components of the attack may not be classed as
particularly “advanced” (e.g. malware components generated from commonly available DIY
construction kits, or the use of easily procured exploit materials), their operators can typically
access and develop more advanced tools as required. They combine multiple attack
methodologies and tools in order to reach and compromise their target.
Persistent – Criminal operators give priority to a specific task, rather than opportunistically seeking
immediate financial gain. This distinction implies that the attackers are guided by external entities.
The attack is conducted through continuous monitoring and interaction in order to achieve the

defined objectives. It does not mean a barrage of constant attacks and malware updates. In fact, a
“low-and-slow” approach is usually more successful.
Threat – means that there is a level of coordinated human involvement in the attack, rather than a
mindless and automated piece of code. The criminal operators have a specific objective and are
skilled, motivated, organized and well funded.


Leave a Reply