Which of the following statements best describes the export phase of an advanced persistent threat?
a. The data captured by an attacker is sent to the attacker’s home base for analysis.
b. An attacker establishes a computer program that bypasses security mechanisms.
c. An attacker is ready to access compromised systems and capture information.
d. The valid user credentials gathered by an attacker is used to install backdoors for distributing malware.
a. The data captured by an attacker is sent to the attacker’s home base for analysis.
An advanced persistent threat (APT) is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. In the export phase, the captured data is exported back to the attacker’s home base for analysis and/or used to commit fraud and other crimes.
You might also like to view...
AutoFiltering allows
a. sorting rows b. displaying rows with a limited number of values c. displaying rows that match specific criteria d. all of the above
When modifying a theme, the color palette furnishes set of colors for every theme
Indicate whether the statement is true or false
____ view is useful when you are working with a complex animation and you want to see how the objects from the various layers overlap each other.
A. Index B. Overlap C. Outline D. Preview
A computer firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network.
Answer the following statement true (T) or false (F)