Home » HP » HPE2-W05 » Which is accessing internal and external resources. They find abnormal activity, indicating communication between a compromised internal user(host) and internal infrastructure, and found a suspicious malware activity. Is this a correct attack stage classification for this activity?
A security analyst is monitoring the traffic which is accessing internal and external resources. They find abnormal activity, indicating communication between a compromised internal user(host) and internal infrastructure, and found a suspicious malware activity. Is this a correct attack stage classification for this activity? (Exfiltration.)
A. Yes
B. No
Correct Answer: B
Explanation/Reference:
Download Printable PDF. VALID exam to help you PASS.
|
|