Skip to main content

Section 3.8 Review Questions

  1. Why might an APT choose to use fileless malware as opposed to malware that runs from a file on a machine?
  2. What is an IoC? Give an example.
  3. What is phishing? What are the five types of phishing? Give an example of each type.
You have attempted 1 of 1 activities on this page.