In a recent cyber-attack against a large corporation, an unknown adversary compromised the network and began escalating privileges and lateral movement. The security team identified that the adversary used a sophisticated set of techniques, specifically targeting zero-day vulnerabilities. As a Certi ed Ethical Hacker (CEH) hired to understand this attack and propose preventive measures, which of the following actions will be most crucial for your initial analysis? A. Identifying the specific tools used by the adversary for privilege escalation. B. Analyzing the initial exploitation methods, the adversary used. C. Checking the persistence mechanisms used by the adversary in compromised systems. D. Investigating the data ex ltration methods used by the adversary. Correct Answer: B This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer