CompTIA CySA+ CS0-003 Practice Question
During a post-breach analysis, a cybersecurity analyst discovers that an attacker leveraged scheduled tasks to execute malicious payloads after initial compromise. Which MITRE ATT&CK tactic BEST describes this observed behavior?
Persistence
Credential Access
Discovery
Privilege Escalation