Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-5001 Topic 6 Question 15 Discussion

Actual exam question for Splunk's SPLK-5001 exam
Question #: 15
Topic #: 6
[All SPLK-5001 Questions]

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Lashaunda
23 days ago
Haha, this sounds like something straight out of a spy movie! I bet the attacker feels like a real-life James Bond. Technique is the answer, for sure.
upvoted 0 times
Cecily
3 days ago
User 2: Definitely! I think the answer is Technique.
upvoted 0 times
...
Skye
14 days ago
User 1: Yeah, it does sound like a spy movie plot!
upvoted 0 times
...
...
Mari
24 days ago
I see where you're coming from, Wilbert, but I think it's a procedure because it outlines a series of steps to follow.
upvoted 0 times
...
Wilbert
25 days ago
I believe it's a tactic because it involves a specific method to achieve a goal.
upvoted 0 times
...
Paulina
28 days ago
I agree with Geoffrey, it sounds like a technique to me.
upvoted 0 times
...
Geoffrey
29 days ago
I think it's a technique.
upvoted 0 times
...
Rosita
1 months ago
This is definitely a Tactic. The attacker is employing a high-level approach to compromise the target.
upvoted 0 times
Whitney
10 days ago
D) Technique
upvoted 0 times
...
Verona
17 days ago
Yes, it's definitely a tactic. The attacker is strategically planning their attack.
upvoted 0 times
...
Francine
18 days ago
A) Tactic
upvoted 0 times
...
...
Melita
2 months ago
I'd say this is a Procedure. The attacker is following a predefined set of steps to achieve their objective.
upvoted 0 times
...
Glory
2 months ago
This looks like a classic Technique used by attackers to establish initial access. The step-by-step description is a textbook example.
upvoted 0 times
Nikita
23 days ago
Attacker: It's a classic Technique used for initial access.
upvoted 0 times
...
Stefania
26 days ago
Victim: I opened the document and a C2 channel was established to the attacker's infrastructure.
upvoted 0 times
...
Vesta
27 days ago
Attacker: I created a unique email with the malicious document.
upvoted 0 times
...
Carole
1 months ago
Attacker: I devised a non-default beacon profile with Cobalt Strike.
upvoted 0 times
...
...

Save Cancel