BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-5001 Topic 1 Question 7 Discussion

Actual exam question for Splunk's SPLK-5001 exam
Question #: 7
Topic #: 1
[All SPLK-5001 Questions]

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Sheridan
1 months ago
I see your point, Leonora, but I still think it's a technique because it's a specific procedure used in a particular situation.
upvoted 0 times
...
Leonora
1 months ago
I believe it's a tactic, because it involves a specific method to achieve a goal.
upvoted 0 times
...
Anika
2 months ago
I agree with Darci, it sounds like a technique to me.
upvoted 0 times
...
Desmond
2 months ago
Hah, I bet the attacker spent more time on their 'extensive research' than their victim did on cybersecurity training! This is clearly a Tactic - the overall approach to compromising the target.
upvoted 0 times
Nieves
17 days ago
No, it's not a Policy. It's more about the attacker's strategy rather than a set of rules or guidelines.
upvoted 0 times
...
Mabelle
18 days ago
B) Policy
upvoted 0 times
...
Reena
21 days ago
That's right, the attacker's overall approach to compromising the target is considered a Tactic.
upvoted 0 times
...
Kenda
30 days ago
A) Tactic
upvoted 0 times
...
...
Roxane
2 months ago
I'm going with C) Procedure. The description outlines a series of ordered steps the attacker follows to achieve their objective.
upvoted 0 times
...
Darci
2 months ago
I think it's a technique.
upvoted 0 times
...
Adria
2 months ago
This definitely sounds like a Technique to me. The step-by-step process is very specific and describes a method for carrying out a cyber attack.
upvoted 0 times
Tonja
2 months ago
Yes, I also think it falls under Technique. The detailed steps show a specific approach to achieve the attacker's goal.
upvoted 0 times
...
Wynell
2 months ago
I think it could also be considered a procedure since it outlines a specific series of steps to follow.
upvoted 0 times
...
Tonja
2 months ago
I agree, it does seem like a Technique. The attacker is using a specific method to carry out the attack.
upvoted 0 times
...
Mitzie
2 months ago
C) Procedure
upvoted 0 times
...
Verda
2 months ago
Yes, I agree. It seems like a detailed method for executing a cyber attack.
upvoted 0 times
...
Ashton
2 months ago
A) Technique
upvoted 0 times
...
...

Save Cancel