Which of the following tactic and technique combinations is sourced from MITRE ATT&CK information?
Which of the following tactic and technique combinations is sourced from MITRE ATT&CK information?
Credential Access via OS Credential Dumping is a tactic and technique combination that is directly sourced from MITRE ATT&CK information. MITRE ATT&CK is a knowledge base of adversary tactics and techniques, and 'Credential Access' and 'OS Credential Dumping' are specific terms used within this framework. Therefore, the correct answer is 'Credential Access via OS Credential Dumping'.
Absolutely D
checked in docs
No its not
D is the only answer that could even be what the question is asking.
Answer is D it is asking about the "MITRE ATT&CK" terms
Answer is D