During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?

Posted by: Pdfprep Category: H12-722-ENU Tags: , ,

During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?
A . Long-term latency and key data collection.
B . Leaks key data information to interested third parties.
C . By phishing emails, attachments carrying a 0day vulnerability cause the user’s terminal to become a springboard for attacks.
D . The attacker sends C&C attack or other remote command to the infected host, cause the attack to spread horizontally across the intranet.

Answer: D

Leave a Reply

Your email address will not be published.