ANSWER THESE 3 questions
The MITRE attack framework is used to mitigating and detecting APT techniques. For a scenario where the adversary is trying to gather information they can use to plan future operations, ‘Reconnaissance’, name and describe three techniques used by adversaries to scope and plan their compromise.
Ransomware has evolved heavily over the past few years to include several new network exploits, including modified polymorphic front end, and zero-day worm propagation techniques. Identify and explain two configurations for defending networks against ransomware exploits.
What is meant by ‘network resilience' and why is it important?
-WRITE THE ANSWER BY THW KWYBOARD-