In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?
- Long-term latency and collection of key data.
- Leak the acquired key data information to a third party of interest
- Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
- The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
Reveal Solution Next Question