ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
While performing threat modeling for a defense contractor's new satellite-control platform, the security architect wants to ensure that the risk from Advanced Persistent Threats (APTs) is properly captured. Which attacker behavior would BEST indicate the presence of an APT rather than a common opportunistic adversary?
Within hours of entry, the intruder encrypts all reachable servers and demands cryptocurrency payment for the decryption keys.
After a successful spear-phishing email, the attacker maintains undetected access for months and slowly exfiltrates satellite design files that support a nation-state's long-term space program.
The attacker quickly replaces the company's public home page with hacktivist slogans to maximize media exposure.
Automated scripts scan wide IP ranges for unpatched systems to conscript them into a spam-sending botnet.
The hallmark of an APT is a highly targeted, well-resourced campaign that establishes a covert, durable foothold and remains in the environment for an extended period to systematically steal or manipulate specific high-value information. Rapid ransomware deployment, indiscriminate botnet building, and visible website defacements are generally associated with short-lived, financially motivated or propaganda-driven attacks that do not require the same level of persistence or strategic focus characteristic of APT operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What distinguishes an APT from other types of cyber threats?
Open an interactive chat with Bash
What techniques do APTs use to maintain persistence within a target's network?
Open an interactive chat with Bash
Why is spear-phishing often associated with APT campaigns?
Open an interactive chat with Bash
What is an Advanced Persistent Threat (APT)?
Open an interactive chat with Bash
How does spear-phishing play a role in APT attacks?
Open an interactive chat with Bash
What are the key differences between APTs and financially motivated attacks like ransomware?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .