109k views
4 votes
An advanced threat emulation engineer is conducting testing against a client's network. The engineer conducts the testing in as realistic a manner as possible. Consequently, the engineer has been gradually ramping up the volume of attacks over a long period of time.

Which of the following combinations of techniques would the engineer MOST likely use in this testing? (Choose three.)

A. Black box testing
B. Gray box testing
C. Code review
D. Social engineering
E. Vulnerability assessment
F. Pivoting
G. Self-assessment
H. White teaming
I. External auditing

User Mmurphy
by
7.3k points

1 Answer

3 votes

Final answer:

B. Gray box testing:

The advanced threat emulation engineer would most likely use social engineering, vulnerability assessment, and pivoting to test a client's network in a realistic and progressive manner.

Step-by-step explanation:

The question pertains to the techniques an advanced threat emulation engineer would most likely use to conduct testing against a client's network in a realistic manner while gradually increasing the attack volume.

The three most appropriate techniques from the provided options would likely be:

  • Social engineering: This technique involves manipulating individuals into revealing confidential information or performing actions that may compromise network security.
  • Vulnerability assessment: This refers to the process of identifying, classifying, and prioritizing vulnerabilities in computer systems, applications, and network infrastructures.
  • Pivoting: Pivoting is a method used by penetration testers to gain further access to a network by exploiting vulnerabilities in a system they have already compromised.

Each of these techniques provides a strategic approach to realistically testing the network's defense mechanisms by replicating methods used by actual attackers over a sustained period.

User Dunkelstern
by
7.6k points