CompTIA CySA+ CS0-003 Practice Question
During a post-breach analysis, an analyst identifies that the adversary used a PowerShell script to establish a reverse shell, allowing them to remotely access and control the compromised system. Which phase of the MITRE ATT&CK framework is the identified action MOST closely associated with?
Initial Access
Impact
Privilege Escalation
Command and Control