Identify a true statement about the incursion phase in an advanced persistent threat.
a. An intruder gains useful information about the target.
b. An intruder establishes a means of accessing a computer program that bypasses security mechanisms.
c. An intruder gathers valid user credentials and installs backdoors for distributing malware.
d. An intruder is ready to access compromised systems and capture information.
b. An intruder establishes a means of accessing a computer program that bypasses security mechanisms.
In the incursion phase of an advanced persistent threat, an attacker gains incursion to the network at a low level to avoid setting off any alarms or suspicion. Some form of spear-fishing may be employed in this phase. Once incursion to the target has been gained, the attacker establishes a back door, or a means of accessing a computer program that bypasses security mechanisms.
You might also like to view...
When you have a project open in Visual Studio, the time during which you build the GUI and write the application’s code is referred to as ____________.
a. prototyping b. design time c. visual planning d. application progression
Case-Based Critical Thinking QuestionsCase 4-2The Yacht club has a Web site that consists of a picture of the yacht club room along with the yacht club rules on the left. On the right is a list of Upcoming Events, the company logo, and then yacht club teacher training dates. Sue, the Web designer, needs some help with CSS to make sure the pages display correctly. Sue needs to create a ____ style sheet so that no unwanted styles will creep in from any browser's internal style sheet.
A. redesign B. reset C. design D. planned
The least expensive form of Internet connection is usually ________
A) DSL B) cable C) FTTH D) dial-up
A set of unified design elements that provide a look for a presentation is called a(n) ________
Fill in the blank(s) with correct word