C is not wrong, but it focuses more on the geographical or logistical aspects rather than the process-oriented nature of APTs. The nuanced distinction lies in the focus on stages (D) versus sources (C). I think D is a better answer.
EC-Council Material reference for attack origination points
They refer to numerous attempts done to gain entry to the target’s network. This point of entry can be used to gain access to the network and launch further attacks. To succeed in gaining initial access, the attacker needs to perform exhaustive research to identify the vulnerabilities and gatekeeper functions in the target network.
Numbers Involved in the Attack It is defined as a number of host systems that are involved in the attack. APT attacks are usually carried out by a crime group or crime organization.
https://www.cimcor.com/blog/14-telltale-characteristics-of-an-advanced-persistent-threat
Attack Origination Points
Multiple attempts at gaining a point of entry may be launched to gain an initial presence within a network, though first attempts are typically sufficiently well-researched to be successful. Months of research can culminate in the full knowledge of your network's vulnerabilities as well as the human gatekeepers within your organization.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
bbb
1 week, 5 days agoBionicBeaver
4 months agoech
4 months, 4 weeks agoBoats
7 months ago