An analyst receives threat intelligence regarding potential attacks from an actor with seemingly unlimited time and resources. Which of the following best describes the threat actor attributed to the malicious activity?
Certmaster 2A:
The "advanced" part of an APT is a crucial identifier, as these types of threats are rarely executed by lone attackers using publicly available exploits or exploit frameworks (such as Metasploit). APT threat groups can access considerable financial and personnel resources, including teams specializing in custom exploit development and execution. APTs spend considerable time gathering intelligence on their targets to develop highly specific exploits. APT groups often combine many different attack elements into a carefully planned and orchestrated attack that may unfold over several months or longer.
APTs have diverse overall goals, but since a significant focus of their attack activities includes custom software development and stealth, most APTs are interested in maintaining access—or persistence—to networks and systems. Because of this, APTs are some of the most notorious and harmful threats to organizations and governments.
There is support in the Comptia criteria that would point to nation state but if you know both C & D, then I say ask the common sense question. Who is likely to outlast the other when it comes to resources? Nation State (it's the government bruh... They have the best of the best) or organized crime (those banned together with all different skill levels and actually do the crime FOR the money)... Nation-state all day. They can use allies as outside resources more effectively, print their own money, and then turn around and use that money to hire those from organized crime organizations to achieve their goal. Hope this helps.
Nation-state actors, such as intelligence agencies and military organizations, often have significant resources allocated to cyber operations. They may possess extensive funding, access to advanced technologies, and a mandate to conduct cyber espionage, cyber warfare, or influence operations.
Correct
A threat actor with seemingly unlimited time and resources typically aligns with a nation-state actor. Nation-states often possess significant resources, both in terms of technology and personnel, allowing them to conduct sophisticated and prolonged cyberattacks.
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.CS0-003 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Kmelaun
Highly Voted 1Â year, 2Â months agoFreshly
Most Recent 7Â months, 2Â weeks agomaggie22
1Â year agomaggie22
1Â year agoc83335b
1Â year, 1Â month ago[Removed]
1Â year, 6Â months agokmordalv
1Â year, 9Â months ago