View all questions & answers for the NSE 7 - Security Operations 7.6 Architect Materials exam
NSE 7 - Security Operations 7.6 Architect Materials-Question 68 Discussion
Comments
Selected Answers: A, D
Review the incident report. Shortly after being compromised, an infected host collected its own network configuration and connection details, then began sending low volume connection attempts to multiple internal addresses to identify responding hosts. Which two MITRE ATT&CK techniques best describe this activity? (Choose two answers)
Brave-Dump Clients Votes