Palo_Alto_NetworksPalo_Alto_Networks
PCCET · Question #162
PCCET Question #162: Real Exam Question with Answer & Explanation
The correct answer is B: Cyber-attack lifecycle. The cyber-attack lifecycle describes the sequential stages an attacker typically follows to infiltrate a network and achieve their objectives, such as stealing data.
Submitted by lucia.co· Apr 18, 2026Cybersecurity Foundations
Question
Which option is a sequence of events that an attacker would perform to infiltrate a network and steal data?
Options
- AAdvanced persistent threats
- BCyber-attack lifecycle
- CEvil twin
- DSpamming botnets
Explanation
The cyber-attack lifecycle describes the sequential stages an attacker typically follows to infiltrate a network and achieve their objectives, such as stealing data.
Common mistakes.
- A. Advanced persistent threats (APTs) are a type of sophisticated, sustained cyber attack, but the term refers to the threat actor and their sustained campaign, not a specific sequence of events itself.
- C. An evil twin is a fraudulent Wi-Fi access point designed to trick users into connecting and revealing sensitive information, which is a specific attack vector, not a general sequence of infiltration events.
- D. Spamming botnets are networks of compromised computers used to distribute spam or launch other attacks, representing an infrastructure used by attackers, not a sequence of events for infiltration.
Concept tested. Cyber-attack lifecycle phases
Reference. https://www.paloaltonetworks.com/cyber-security-attack-lifecycle
Topics
#Cyber kill chain#Attack phases#Threat actor methodology
Community Discussion
No community discussion yet for this question.