Question 42:
A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization`s financial assets. Which of the following is the BEST example of the level of sophistication this threat actor is using?
Answer options:
A. Social media accounts attributed to the threat actor B. Custom malware attributed to the threat actor from prior attacks C. Email addresses and phone numbers tied to the threat actor D. Network assets used in previous attacks attributed to the threat actor E. IP addresses used by the threat actor for command and control