Which term describes a highly skilled attacker using multiple vectors to achieve objectives?

Prepare for the NOCTI Cybersecurity Certification Exam. Enhance your skills with quizzes and multiple-choice questions, accompanied by explanations and hints. Ace your certification!

Multiple Choice

Which term describes a highly skilled attacker using multiple vectors to achieve objectives?

Explanation:
A highly skilled attacker using multiple vectors to achieve objectives is described by a profile known as an advanced persistent threat. The “advanced” part points to sophisticated tools and techniques, the “persistent” part highlights a long, stealthy presence inside a target network, and the “threat” aspect denotes a deliberate, organized adversary with defined goals. In practice, such campaigns blend several methods—phishing to steal credentials, zero-days, credential dumping, lateral movement, and gradual data exfiltration—so the attacker can maintain access while evading detection. This differs from a virus, which is malware that attaches to files to spread; a worm, which self-reabets through networks without user action; and cryptography, which is the discipline of protecting information.

A highly skilled attacker using multiple vectors to achieve objectives is described by a profile known as an advanced persistent threat. The “advanced” part points to sophisticated tools and techniques, the “persistent” part highlights a long, stealthy presence inside a target network, and the “threat” aspect denotes a deliberate, organized adversary with defined goals. In practice, such campaigns blend several methods—phishing to steal credentials, zero-days, credential dumping, lateral movement, and gradual data exfiltration—so the attacker can maintain access while evading detection. This differs from a virus, which is malware that attaches to files to spread; a worm, which self-reabets through networks without user action; and cryptography, which is the discipline of protecting information.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy