Which phase of an advanced persistent threat enables anintruder to gain useful information about the target?
a. The discovery phase
b. The capture phase
c. The reconnaissance phase
d. The incursion phase
c. The reconnaissance phase
An advanced persistent threat (APT) is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. The intruder begins by conducting reconnaissance on the network to gain useful information about the target (security software installed, computing resources connected to the network, number of users, etc.).
You might also like to view...
Which of the following methods affixes the new node as a child of a specified node?
A. node.normalize(new, old) B. node.insertBefore(new, child) C. node.appendChild(new) D. node.childNodes(new)
If you added a row that should not be in a table, use a REMOVE command to remove it.
Answer the following statement true (T) or false (F)
When an alert action is configured to run a script, Splunk must be able to locate the script. Which is one of the directories Splunk will look in to find the script?
A. $SPLUNK_HOME/bin/scripts B. $SPLUNK_HOME/etc/scripts C. $SPLUNK_HOME/bin/etc/scripts D. $SPLUNK_HOME/etc/scripts/bin
The backbone of a website's navigation structure is its ____________________ .
Fill in the blank(s) with the appropriate word(s).