After a series of UEBA alerts, a company's SOC observes an extended period of suspicious outbound traffic all with the same destination. Which of the following steps of the cyber kill chain has this attack completed?
Correct answer: b. Command and Control (C2)
The Command and Control stage occurs after an attacker has successfully exploited a vulnerability on a target system. Once access is gained, the compromised system must maintain communication with the attacker's infrastructure—often referred to as a C2 server—to receive further commands, updates, or to exfiltrate data.
Key signs of C2 activity include:
This stage is crucial for attackers to maintain control over their foothold in the network and conduct further malicious activities.
Why the other choices are incorrect:
No Payment Cards Needed
Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.
You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams