Which of the following attack techniques is used by John?

Posted by: Pdfprep Category: 312-50v11 Tags: , ,

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.

Which of the following attack techniques is used by John?
A . Advanced persistent
B . threat Diversion theft
C . Spear-phishing sites
D . insider threat

Answer: A

Explanation:

An advanced persistent threat (APT) may be a broad term wont to describe AN attack campaign within which an intruder, or team of intruders, establishes a bootleg, long presence on a network so as to mine sensitive knowledge.

The targets of those assaults, that square measure terribly fastidiously chosen and researched, usually embrace massive enterprises or governmental networks. the implications of such intrusions square measure huge, and include:

✑ Intellectual property thieving (e.g., trade secrets or patents)

✑ Compromised sensitive info (e.g., worker and user personal data)

✑ The sabotaging of essential structure infrastructures (e.g., information deletion)

✑ Total website takeovers

Executing an APT assault needs additional resources than a regular internet application attack. The perpetrators square measure typically groups of intimate cybercriminals having substantial resource. Some APT attacks square measure government-funded and used as cyber warfare weapons.

APT attacks dissent from ancient internet application threats, in that:

✑ They’re considerably additional advanced.

✑ They’re not hit and run attacks―once a network is infiltrated, the culprit remains so as to realize the maximum amount info as potential.

✑ They’re manually dead (not automated) against a selected mark and indiscriminately launched against an outsized pool of targets.

✑ They typically aim to infiltrate a complete network, as opposition one specific half. More common attacks, like remote file inclusion (RFI), SQL injection and cross-site scripting (XSS), square measure oftentimes employed by perpetrators to ascertain a footing in a very targeted network. Next, Trojans and backdoor shells square measure typically wont to expand that foothold and make a persistent presence inside the targeted perimeter.

Leave a Reply

Your email address will not be published.