In an advanced persistent threat scenario, an adversary follows a detailed set of procedures in the cyber kill chain. During one such instance, the adversary has successfully gained access to a corporate network and now attempts to obfuscate malicious traffic within legitimate network traffic. Which of the following actions would most likely be part of the adversary's current procedures? A. Employing data staging techniques to collect and aggregate sensitive data. B. Initiating DNS tunneling to communicate with the command-and-control server. C. Establishing a command-and-control server to communicate with compromised systems. D. Conducting internal reconnaissance using PowerShell scripts. Correct Answer: B This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer