Examlex
A security analyst is attempting to utilize the following threat intelligence for developing detection capabilities: APT X's approach to a target would be sending a phishing email to the target after conducting active and passive reconnaissance. Upon successful compromise, APT X conducts internal reconnaissance and attempts to move laterally by utilizing existing resources. When APT X finds data that aligns to its objectives, it stages and then exfiltrates data sets in sizes that can range from 1GB to 5GB. APT X also establishes several backdoors to maintain a C2 presence in the environment. In which of the following phases in this APT MOST likely to leave discoverable artifacts?
Restitution
The act of compensating for loss, damage, or injury caused, often involving the return of stolen or lost property to the rightful owner.
Partially Executed
Refers to a contract or agreement where some, but not all, of the required actions have been completed by the parties involved.
Illegal Contract
An agreement between parties that is prohibited by law or violates legal statutes, making it unenforceable.
Breach
To violate a law, by an act or an omission, or to break a legal obligation that one owes to another person or to society.
Q2: A cloud technology vendor has released an
Q15: Which of the following provides the BEST
Q21: A systems administrator has migrated an internal
Q29: Which of the following sources would a
Q52: For security reasons, a cloud service that
Q66: A security analyst wants to identify which
Q82: A security analyst is attempting to utilize
Q96: A courier company has virtualized its packing
Q207: A new SaaS timecard application that is
Q273: A technician sets up a new computer