Which of the following is NOT one of the five phases of an attack?

Prepare for the GIAC Information Security Fundamentals (GISF) exam with our comprehensive study materials, including flashcards, multiple choice questions, and detailed explanations. Enhance your information security knowledge and boost your exam confidence today!

Negotiation is not recognized as one of the five phases of an attack, which typically include reconnaissance, gaining access, maintaining access, covering tracks, and the final phase of actions on objectives. The reconnaissance phase involves gathering information about the target, which is crucial for the attacker to identify potential vulnerabilities. Gaining access refers to penetrating the security mechanisms to enter the target environment. Covering tracks is essential for attackers to erase or obscure their actions to avoid detection.

In contrast, negotiation does not align with these structured phases. It may imply a scenario where attackers discuss or seek terms with victims but does not fit into the primary methodology of attacking systems or networks. Understanding these phases is vital for protecting against attacks, as it allows security professionals to identify and mitigate threats at various stages of the attack lifecycle.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy