ECCouncil 312-50v13 Question Answer
As part of a red team campaign against a pharmaceutical company in Boston, ethical hacker Alex begins with a successful spear-phishing attack that delivers an initial payload to a manager ' s laptop. After gaining access, Alex pivots to harvesting cached credentials and using them to move laterally across the internal network. Soon, routers, printers, and several file servers are compromised, expanding the red team ' s control beyond the original host. At this point, Alex has not yet targeted sensitive research data, but the team has built a broader foothold within the environment.
Which phase of the Advanced Persistent Threat (APT) lifecycle is Alex simulating?
ECCouncil 312-50v13 Summary
- Vendor: ECCouncil
- Product: 312-50v13
- Update on: Mar 16, 2026
- Questions: 584

