اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 933 من 1040

كل الأسئلة

A threat intelligence analyst is updating a document according to the MITRE ATT&CK framework. The analyst detects the following behavior from a malicious actor:
“The malicious actor will attempt to achieve unauthorized access to the vulnerable system.”
In which of the following phases should the analyst include the detection?

الخيارات

  • A Procedures
  • B Techniques
  • C Tactics
  • D Subtechniques

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.