In the context of an advanced persistent threat, identify the phase during which an intruder is ready to access unprotected or compromised systems.

a. The reconnaissance phase
b. The discovery phase
c. The capture phase
d. The export phase


c. The capture phase
An advanced persistent threat (APT) is a network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time. In the capture phase of the advanced persistent threat, theattacker is ready to access unprotected or compromised systems and capture information over a long period of time.

Computer Science & Information Technology

You might also like to view...

The _______ is a collection of hardware and software associated with the Internet that allows computer users to locate and view multimedia-based documents on almost any subject.

a) HyperText Markup Language b) HyperText Transfer Protocol c) World Wide Web d) CERN

Computer Science & Information Technology

A print server can be a computer that connects to a printer and a network but is not used for production

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following declares a pointer to a pointer to an integer?

A. int&  p; B. int&& p; C. int*  p; D. int** p;  E. int* &p;

Computer Science & Information Technology

Which of the following is not a basic strategy to control risks?

a) Defense b) Transference c) Acceptance d) Deterrence

Computer Science & Information Technology