New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-5001 Topic 6 Question 15 Discussion

Actual exam question for Splunk's SPLK-5001 exam
Question #: 15
Topic #: 6
[All SPLK-5001 Questions]

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Melita
18 days ago
I'd say this is a Procedure. The attacker is following a predefined set of steps to achieve their objective.
upvoted 0 times
...
Glory
19 days ago
This looks like a classic Technique used by attackers to establish initial access. The step-by-step description is a textbook example.
upvoted 0 times
Carole
5 days ago
Attacker: I devised a non-default beacon profile with Cobalt Strike.
upvoted 0 times
...
...

Save Cancel