contestada

David, a software engineer, recently bought a brand new laptop because his enterprise follows the BYOD (bring your own device) model. David was part of a software development project where the software code was leaked before its release. Further investigation proved that a vulnerability in David's laptop caused the exposure. David insists he never used the laptop to access any network or integrate any devices, and the laptop was kept in a vault while not in use. Which of the following attack vectors was used by the threat actor?
A. Direct Access
B. Wireless
C. Supply Chain
D. Removeable media
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised credentials to access the network?
A. non-credentialed scan
B. Credentialed scan
C. Intrusive scan
D. Nonintrusive scan
Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?
A. Initial Compromise
B. Lateral movement
C. Privilege escalation
D. Data exfiltration
In a device driver manipulation attack, which of the following changes a device driver's existing code design?
A. API attack
B. Refactoring
C. Improper Input Handling
D. Time of check/time of use in race conditions

Respuesta :

The attack vector that was used by the threat actor is D. Removeable media.

The type of vulnerability scan mimics the work of a threat actor is called B. Credential Scan.

The technique that the threat actor using to move through the network is B. Lateral movement.

In a device driver manipulation attack, the changes a device driver's existing code design is B. Refactoring

What is a credential vulnerability scan?

A scan known as a "credential vulnerability scan" involves a successful authentication of credentials. Examples include providing usernames, passwords, and other information to the vulnerability scanner in order to act like a threat actor who has access to those credentials.

They are notorious for being extremely slow, but they can provide a thorough understanding of the system by accessing a variety of the installed software.

In order to find the important data and assets that will ultimately be the target of their attack campaigns, cyberattackers, also known as threat actors, employ techniques known as network lateral movement, or simply lateral movement.

Learn more about scan on:

https://brainly.com/question/25804291

#SPJ1