Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-5001 Topic 2 Question 17 Discussion

Actual exam question for Splunk's SPLK-5001 exam
Question #: 17
Topic #: 2
[All SPLK-5001 Questions]

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Winifred
12 days ago
I'm not sure, but I think it could also be C) Procedure because it outlines a series of steps.
upvoted 0 times
...
Blossom
23 days ago
This has to be a Technique. The level of technical detail and the specific 'how-to' nature of the description is a dead giveaway.
upvoted 0 times
...
Kayleigh
23 days ago
Wait, so the attacker is doing research on their target? Sounds like a lot of work. I prefer the 'spray and pray' approach - less thinking, more hacking!
upvoted 0 times
...
Lenna
25 days ago
I agree with Cherelle, it sounds like a specific method or approach.
upvoted 0 times
...
Steffanie
26 days ago
Definitely a Procedure. The question outlines a standardized, step-by-step approach to carrying out a particular activity.
upvoted 0 times
...
Rhea
27 days ago
I'd say this is a Tactic. The attacker is employing a set of coordinated actions to achieve a specific objective, which is the definition of a tactic.
upvoted 0 times
Werner
7 days ago
Yes, the attacker is definitely using a strategic plan to carry out the attack.
upvoted 0 times
...
Cory
9 days ago
I agree, it seems like a well thought out tactic.
upvoted 0 times
...
...
Quentin
29 days ago
This looks like a textbook example of a Technique. The step-by-step process described is a specific method used by attackers to establish a C2 channel.
upvoted 0 times
Nohemi
10 days ago
User 2: Yeah, the detailed process points towards a specific method.
upvoted 0 times
...
Jamal
15 days ago
User 1: I agree, it definitely seems like a Technique.
upvoted 0 times
...
...
Cherelle
1 months ago
I think the answer is D) Technique.
upvoted 0 times
...

Save Cancel