Exam4Training

Phishing belongs to which of the following MITRE ATT&CK tactics?

Phishing belongs to which of the following MITRE ATT&CK tactics?
A . Initial Access, Persistence
B . Persistence, Command and Control
C . Reconnaissance, Persistence
D . Reconnaissance, Initial Access

Answer: D

Explanation:

Phishing is a technique that belongs to two MITRE ATT&CK tactics: Reconnaissance and Initial Access. Reconnaissance is the process of gathering information about a target before launching an attack. Phishing for information is a sub-technique of Reconnaissance that involves sending phishing messages to elicit sensitive information that can be used during targeting. Initial Access is the process of gaining a foothold in a network or system. Phishing is a sub-technique of Initial Access that involves sending phishing messages to execute malicious code on victim systems. Phishing can be used for both Reconnaissance and Initial Access depending on the objective and content of the phishing message.

Reference: Phishing, Technique T1566 – Enterprise | MITRE ATT&CK® 1

Phishing for Information, Technique T1598 – Enterprise | MITRE ATT&CK® 2 Phishing for information, Part 2: Tactics and techniques 3

PHISHING AND THE MITREATT&CK FRAMEWORK – EnterpriseTalk 4 Initial Access, Tactic TA0001 – Enterprise | MITRE ATT&CK® 5

Latest PCDRA Dumps Valid Version with 60 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version