In which phase of t...
 
Notifications
Clear all

In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?

1 Posts
1 Users
0 Likes
148 Views
(@hepnerjacques)
Posts: 705
Noble Member
Topic starter
 

In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?

  • A . exploitation
    B. actions on the objective
    C. command and control
    D. installation

Show Answer Hide Answer

Suggested Answer: C

Explanation:

Command and Control: Attackers establish encrypted communication channels back to command-and-control (C2) servers across the internet so that they can modify their attack objectives and methods as additional targets of opportunity are identified within the victim network, or to evade any new security countermeasures that the organization may attempt to deploy if attack artifacts are discovered.
 
Posted : 08/11/2022 10:49 pm

Latest Paloalto Networks PCCET Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: