exam questions

Exam 312-85 All Questions

View all questions & answers for the 312-85 exam

Exam 312-85 topic 1 question 16 discussion

Actual exam question from ECCouncil's 312-85
Question #: 16
Topic #: 1
[All 312-85 Questions]

Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?

  • A. Risk tolerance
  • B. Timeliness
  • C. Attack origination points
  • D. Multiphased
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
bbb
1 week, 5 days ago
Selected Answer: D
C is not wrong, but it focuses more on the geographical or logistical aspects rather than the process-oriented nature of APTs. The nuanced distinction lies in the focus on stages (D) versus sources (C). I think D is a better answer.
upvoted 1 times
...
BionicBeaver
4 months ago
Selected Answer: C
Answer is C As per Module 02 Page 99 of CTIA Courseware
upvoted 1 times
...
ech
4 months, 4 weeks ago
EC-Council Material reference for attack origination points They refer to numerous attempts done to gain entry to the target’s network. This point of entry can be used to gain access to the network and launch further attacks. To succeed in gaining initial access, the attacker needs to perform exhaustive research to identify the vulnerabilities and gatekeeper functions in the target network. Numbers Involved in the Attack It is defined as a number of host systems that are involved in the attack. APT attacks are usually carried out by a crime group or crime organization.
upvoted 1 times
...
Boats
7 months ago
Selected Answer: C
https://www.cimcor.com/blog/14-telltale-characteristics-of-an-advanced-persistent-threat Attack Origination Points Multiple attempts at gaining a point of entry may be launched to gain an initial presence within a network, though first attempts are typically sufficiently well-researched to be successful. Months of research can culminate in the full knowledge of your network's vulnerabilities as well as the human gatekeepers within your organization.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago