✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Rhonda is a cybersecurity professional for a major tech company. One day, she receives an alert indicating that someone or something has gained unauthorized access to the company’s system. Rhonda investigates the event and decides that the intruder is a cyberattacker. To predict techniques that the attacker might use next, Rhonda checks the MITRE ATT&CK matrix. View the provided screenshot for reference; it shows an excerpt from the matrix.
Which of the following items listed in the MITRE ATT&CK matrix is a technique that the attacker might use as part of the attack?
Select all that apply.