Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-5001 Topic 7 Question 22 Discussion

Actual exam question for Splunk's SPLK-5001 exam
Question #: 22
Topic #: 7
[All SPLK-5001 Questions]

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Clement
1 days ago
This looks like a Procedure to me. The detailed instructions outline a standardized process the attacker follows.
upvoted 0 times
...
Wayne
2 days ago
I believe it's a tactic, because it involves a specific method to achieve a goal.
upvoted 0 times
...
Bettina
19 days ago
I agree with Elvera, it sounds like a technique to me.
upvoted 0 times
...
Elvera
21 days ago
I think it's a technique.
upvoted 0 times
...
Nan
22 days ago
I'd say this is a Tactic. The attacker is employing a series of actions to achieve a specific goal, which is the hallmark of a tactic.
upvoted 0 times
Edison
2 days ago
I agree, it seems like a well-thought-out tactic.
upvoted 0 times
...
...
Carlee
28 days ago
Definitely a Technique. The step-by-step process describes a specific method an attacker would use to gain unauthorized access.
upvoted 0 times
Janna
16 days ago
A) Technique
upvoted 0 times
...
...

Save Cancel