A financial organization is assessing the methods used by cyber adversaries to gain unauthorized access to their systems. Which tactic within the MITRE ATT&CK framework BEST describes techniques adversaries might use to initially breach the organization's defenses?
The correct answer is 'Initial Access'. This tactic includes methods an adversary might use to gain a foothold within the organization's network, such as spear phishing or exploiting software vulnerabilities. While 'Execution' and 'Persistence' are also important, they occur after initial access has been obtained. 'Command and Control' pertains to the adversary's communication with a compromised system, typically following initial access and setup.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common techniques used in Initial Access?
Open an interactive chat with Bash
What is the MITRE ATT&CK framework and why is it important?
Open an interactive chat with Bash
What comes after Initial Access in the MITRE ATT&CK framework?