New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Splunk Certified Cybersecurity Defense Analyst SPLK-5001 Question # 16 Topic 2 Discussion

Splunk Certified Cybersecurity Defense Analyst SPLK-5001 Question # 16 Topic 2 Discussion

SPLK-5001 Exam Topic 2 Question 16 Discussion:
Question #: 16
Topic #: 2

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker’s temporary infrastructure on a compromised website.


A.

Tactic


B.

Policy


C.

Procedure


D.

Technique


Get Premium SPLK-5001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.