Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-5001 Topic 6 Question 15 Discussion

Actual exam question for Splunk's SPLK-5001 exam
Question #: 15
Topic #: 6
[All SPLK-5001 Questions]

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Lashaunda
2 months ago
Haha, this sounds like something straight out of a spy movie! I bet the attacker feels like a real-life James Bond. Technique is the answer, for sure.
upvoted 0 times
Paz
29 days ago
User 3: Agreed, the attacker must feel like a real-life James Bond.
upvoted 0 times
...
Cecily
1 months ago
User 2: Definitely! I think the answer is Technique.
upvoted 0 times
...
Skye
2 months ago
User 1: Yeah, it does sound like a spy movie plot!
upvoted 0 times
...
...
Mari
2 months ago
I see where you're coming from, Wilbert, but I think it's a procedure because it outlines a series of steps to follow.
upvoted 0 times
...
Wilbert
2 months ago
I believe it's a tactic because it involves a specific method to achieve a goal.
upvoted 0 times
...
Paulina
2 months ago
I agree with Geoffrey, it sounds like a technique to me.
upvoted 0 times
...
Geoffrey
2 months ago
I think it's a technique.
upvoted 0 times
...
Rosita
2 months ago
This is definitely a Tactic. The attacker is employing a high-level approach to compromise the target.
upvoted 0 times
Fallon
1 months ago
I think it's more of a technique, as it involves specific steps and methods to achieve the goal.
upvoted 0 times
...
Whitney
2 months ago
D) Technique
upvoted 0 times
...
Verona
2 months ago
Yes, it's definitely a tactic. The attacker is strategically planning their attack.
upvoted 0 times
...
Francine
2 months ago
A) Tactic
upvoted 0 times
...
...
Melita
3 months ago
I'd say this is a Procedure. The attacker is following a predefined set of steps to achieve their objective.
upvoted 0 times
...
Glory
3 months ago
This looks like a classic Technique used by attackers to establish initial access. The step-by-step description is a textbook example.
upvoted 0 times
Nikita
2 months ago
Attacker: It's a classic Technique used for initial access.
upvoted 0 times
...
Stefania
2 months ago
Victim: I opened the document and a C2 channel was established to the attacker's infrastructure.
upvoted 0 times
...
Vesta
2 months ago
Attacker: I created a unique email with the malicious document.
upvoted 0 times
...
Carole
2 months ago
Attacker: I devised a non-default beacon profile with Cobalt Strike.
upvoted 0 times
...
...

Save Cancel