312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 3


John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.

Which of the following attack techniques is used by John?

Show Answer
Correct Answer: D

John's actions indicate the use of an Advanced Persistent Threat (APT). An APT involves an unauthorized entity gaining access to a network and remaining undetected over an extended period to gather sensitive information without causing immediate damage. This fits the description of John's prolonged, undetected presence and data exfiltration within the target network.

Discussion

6 comments
Sign in to comment
eli117Option: D
Apr 4, 2023

An advanced persistent threat (APT) is a type of cyber attack where an attacker gains unauthorized access to a network and remains undetected for an EXTENDED PERIOD OF TIME.

jeremy13Option: D
May 3, 2023

D. Advanced persistent threat like V11 Q227

insaniuntOption: D
Nov 26, 2023

D. Advanced persistent threat

Satyam2816Option: D
Dec 2, 2024

APT (Advanced persistent threat), due to untauthorized access in network and without being detected in network for a long time

Mann098Option: D
Dec 27, 2024

Advanced persistent threat

AdminmaeliOption: D
Jan 4, 2025

Advanced persistent threat