What differentiates a tactic from a technique in the context of an attack?

Explore the Certified Ethical Hacker (CEHv13) Test. Gain proficiency with multiple-choice questions and insights to excel. Prepare effectively for your certification today!

Multiple Choice

What differentiates a tactic from a technique in the context of an attack?

Explanation:
In the context of an attack, a tactic is understood as an overarching strategy or objective that guides the actions taken during the attack. It defines what the attacker aims to achieve. Techniques, on the other hand, refer to the specific methods or ways in which those tactics are implemented to accomplish the desired objective. For example, if the tactic is to gain unauthorized access to a system (the overall goal), the specific techniques used to achieve this could include phishing, exploiting vulnerabilities, or using brute force attacks. Understanding this distinction is crucial for security professionals, as it allows them to recognize the broader strategies employed by attackers as well as the specific methods used to execute those strategies. The other options do not accurately reflect the relationship between tactics and techniques. They confuse the definitions and do not align with the established terminology in cybersecurity and ethical hacking.

In the context of an attack, a tactic is understood as an overarching strategy or objective that guides the actions taken during the attack. It defines what the attacker aims to achieve. Techniques, on the other hand, refer to the specific methods or ways in which those tactics are implemented to accomplish the desired objective.

For example, if the tactic is to gain unauthorized access to a system (the overall goal), the specific techniques used to achieve this could include phishing, exploiting vulnerabilities, or using brute force attacks. Understanding this distinction is crucial for security professionals, as it allows them to recognize the broader strategies employed by attackers as well as the specific methods used to execute those strategies.

The other options do not accurately reflect the relationship between tactics and techniques. They confuse the definitions and do not align with the established terminology in cybersecurity and ethical hacking.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy