Which of the following tactic and technique combinations is sourced from MITRE ATT&CK information?
Which of the following tactic and technique combinations is sourced from MITRE ATT&CK information?
Credential Access via OS Credential Dumping is a tactic and technique combination that is directly sourced from MITRE ATT&CK information. MITRE ATT&CK is a knowledge base of adversary tactics and techniques, and 'Credential Access' and 'OS Credential Dumping' are specific terms used within this framework. Therefore, the correct answer is 'Credential Access via OS Credential Dumping'.
Absolutely D
Answer is D
Answer is D it is asking about the "MITRE ATT&CK" terms
D is the only answer that could even be what the question is asking.
checked in docs
No its not