In the context of an advanced persistent threat, identify the phase during which an intruder is ready to access unprotected or compromised systems.
a. The reconnaissance phase
b. The discovery phase
c. The capture phase
d. The export phase
c. The capture phase
An advanced persistent threat (APT) is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. In the capture phase of the advanced persistent threat, theattacker is ready to access unprotected or compromised systems and capture information over a long period of time.
You might also like to view...
The _______ is a collection of hardware and software associated with the Internet that allows computer users to locate and view multimedia-based documents on almost any subject.
a) HyperText Markup Language b) HyperText Transfer Protocol c) World Wide Web d) CERN
A print server can be a computer that connects to a printer and a network but is not used for production
Indicate whether the statement is true or false
Which of the following declares a pointer to a pointer to an integer?
A. int& p; B. int&& p; C. int* p; D. int** p; E. int* &p;
Which of the following is not a basic strategy to control risks?
a) Defense b) Transference c) Acceptance d) Deterrence