View all questions & answers for the NSE 7 - Security Operations 7.6 Architect Materials exam


NSE 7 - Security Operations 7.6 Architect Materials-Question 68 Discussion

Review the incident report. Shortly after being compromised, an infected host collected its own network configuration and connection details, then began sending low volume connection attempts to multiple internal addresses to identify responding hosts. Which two MITRE ATT&CK techniques best describe this activity? (Choose two answers)

  • A. System Network Connections Discovery
  • B. Network Sniffing
  • C. Lateral Movement
  • D. Active Scanning
Correct Answer: A,D

Brave-Dump Clients Votes

AD 100%

Comments



Brave-Dumps.com Admin 2026-03-17 02:21:00

Selected Answers: A, D


It needs additional check from our experts