DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. Fortinet
  3. FCSS - Security Operations 7.4 Analyst
  4. Fortinet.FCSS_SOC_AN-7.4.v2024-10-22.q11
  5. Question 5

Join the discussion

Question 5/11

Review the following incident report:
Attackers leveraged a phishing email campaign targeting your employees.
The email likely impersonated a trusted source, such as the IT department, and requested login credentials.
An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).
The RAT provided the attackers with remote access and a foothold in the compromised system.
Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

Correct Answer: A,D
* Understanding the MITRE ATT&CK Tactics:
* The MITRE ATT&CK framework categorizes various tactics and techniques used by adversaries to achieve their objectives.
* Tactics represent the objectives of an attack, while techniques represent how those objectives are achieved.
* Analyzing the Incident Report:
* Phishing Email Campaign:This tactic is commonly used for gaining initial access to a system.
* Malicious Link and RAT Download:Clicking a malicious link and downloading a RAT is indicative of establishing initial access.
* Remote Access Trojan (RAT):Once installed, the RAT allows attackers to maintain access over an extended period, which is a persistence tactic.
* Mapping to MITRE ATT&CK Tactics:
* Initial Access:
* This tactic covers techniques used to gain an initial foothold within a network.
* Techniques include phishing and exploiting external remote services.
* The phishing campaign and malicious link click fit this category.
* Persistence:
* This tactic includes methods that adversaries use to maintain their foothold.
* Techniques include installing malware that can survive reboots and persist on the system.
* The RAT provides persistent remote access, fitting this tactic.
* Exclusions:
* Defense Evasion:
* This involves techniques to avoid detection and evade defenses.
* While potentially relevant in a broader context, the incident report does not specifically describe actions taken to evade defenses.
* Lateral Movement:
* This involves moving through the network to other systems.
* The report does not indicate actions beyond initial access and maintaining that access.
Conclusion:
* The incident report captures the tactics ofInitial AccessandPersistence.
References:
* MITRE ATT&CK Framework documentation on Initial Access and Persistence tactics.
* Incident analysis and mapping to MITRE ATT&CK tactics.

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (11q)
Q1. Refer to the exhibits. (Exhibit) The Malicious File Detect playbook is configured to creat...
Q2. Refer to Exhibit: (Exhibit) You are tasked with reviewing a new FortiAnalyzer deployment i...
Q3. While monitoring your network, you discover that one FortiGate device is sending significa...
Q4. When configuring a FortiAnalyzer to act as a collector device, which two steps must you pe...
Q5. Review the following incident report: Attackers leveraged a phishing email campaign target...
Q6. Refer to the exhibit. (Exhibit) Assume that all devices in the FortiAnalyzer Fabric are sh...
Q7. A customer wants FortiAnalyzer to run an automation stitch that executes a CLI command on ...
Q8. Refer to the exhibits. (Exhibit) The FortiMail Sender Blocklist playbook is configured to ...
Q9. When configuring a FortiAnalyzer to act as a collector device, which two steps must you pe...
Q10. Refer to the exhibits. (Exhibit) You configured a custom event handler and an associated r...
Q11. Refer to the Exhibit: (Exhibit) An analyst wants to create an incident and generate a repo...
[×]

Download PDF File

Enter your email address to download Fortinet.FCSS_SOC_AN-7.4.v2024-10-22.q11.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.