Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-5001 Topic 1 Question 7 Discussion

Actual exam question for Splunk's SPLK-5001 exam
Question #: 7
Topic #: 1
[All SPLK-5001 Questions]

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Sheridan
2 months ago
I see your point, Leonora, but I still think it's a technique because it's a specific procedure used in a particular situation.
upvoted 0 times
...
Leonora
2 months ago
I believe it's a tactic, because it involves a specific method to achieve a goal.
upvoted 0 times
...
Anika
3 months ago
I agree with Darci, it sounds like a technique to me.
upvoted 0 times
...
Desmond
3 months ago
Hah, I bet the attacker spent more time on their 'extensive research' than their victim did on cybersecurity training! This is clearly a Tactic - the overall approach to compromising the target.
upvoted 0 times
Nieves
1 months ago
No, it's not a Policy. It's more about the attacker's strategy rather than a set of rules or guidelines.
upvoted 0 times
...
Mabelle
1 months ago
B) Policy
upvoted 0 times
...
Reena
1 months ago
That's right, the attacker's overall approach to compromising the target is considered a Tactic.
upvoted 0 times
...
Kenda
2 months ago
A) Tactic
upvoted 0 times
...
...
Roxane
3 months ago
I'm going with C) Procedure. The description outlines a series of ordered steps the attacker follows to achieve their objective.
upvoted 0 times
...
Darci
3 months ago
I think it's a technique.
upvoted 0 times
...
Adria
3 months ago
This definitely sounds like a Technique to me. The step-by-step process is very specific and describes a method for carrying out a cyber attack.
upvoted 0 times
Tonja
2 months ago
Yes, I also think it falls under Technique. The detailed steps show a specific approach to achieve the attacker's goal.
upvoted 0 times
...
Wynell
2 months ago
I think it could also be considered a procedure since it outlines a specific series of steps to follow.
upvoted 0 times
...
Tonja
2 months ago
I agree, it does seem like a Technique. The attacker is using a specific method to carry out the attack.
upvoted 0 times
...
Mitzie
3 months ago
C) Procedure
upvoted 0 times
...
Verda
3 months ago
Yes, I agree. It seems like a detailed method for executing a cyber attack.
upvoted 0 times
...
Ashton
3 months ago
A) Technique
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77