Match the intrusion event defined in the Diamond Model of intrusion to the description.
|network path used to establish and maintain command and controlk
|a tool or technique used to attack the victim
|the parties responsible for the intrusion
|the target of the attack
Exam with this question: Modules 26 - 28: Analyzing Security Data Group Exam
Exam with this question: Checkpoint Exam: Incident Response Answers