Skip to main content

Section 3.8 Review Questions

  1. Why might an APT choose to use fileless malware as opposed to malware that runs from a file on a machine?
  2. What is an IoC? Give an example.
  3. What is phishing? What are the five types of phishing? Give an example of each type.
You have attempted of activities on this page.