Multiple Choice
A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization's financial assets. Which of the following is the BEST example of the level of sophistication this threat actor is using?
A) Social media accounts attributed to the threat actor
B) Custom malware attributed to the threat actor from prior attacks
C) Email addresses and phone numbers tied to the threat actor
D) Network assets used in previous attacks attributed to the threat actor
E) IP addresses used by the threat actor for command and control
Correct Answer:

Verified
Correct Answer:
Verified
Q86: A cybersecurity analyst is responding to an
Q87: An analyst wants to identify hosts that
Q88: A critical server was compromised by malware,
Q89: A security analyst has observed several incidents
Q90: A security analyst is providing a risk
Q92: A SIEM solution alerts a security analyst
Q93: A security analyst has received reports of
Q94: An organization developed a comprehensive incident response
Q95: Which of the following should a database
Q96: A web-based front end for a business