During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?

During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?
A . Long-term latency and key data collection.
B . Leaks key data information to interested third parties.
C . By phishing emails, attachments carrying a 0day vulnerability cause the user’s terminal to become a springboard for attacks.
D . The attacker sends C&C attack or other remote command to the infected host, cause the attack to spread horizontally across the intranet.

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments