Matching
Match the stage of the "kill chain" to its definition.
Premises:
Exploitation
Command and control
Exfiltration
Weaponization and delivery
Reconnaissance
Responses:
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Establishing a target, creating an attack payload, and sending it to the target
The attacker downloads tools and moves laterally onto other hosts
Installing malware that allows continued access
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Correct Answer:
Premises:
Responses:
Exploitation
Command and control
Exfiltration
Weaponization and delivery
Reconnaissance
Premises:
Exploitation
Command and control
Exfiltration
Weaponization and delivery
Reconnaissance
Responses:
Related Questions
Q59: _ involves cyberhacking committed with political and
Q60: Augmented reality may provide police with the
Q61: Explain computerized crime mapping and how it
Q62: _ reality technology uses wearable components to
Q63: Discuss the pros and cons of using
Q64: You work for a large urban police
Q65: Explain some of the uses of drones
Q66: The addition of a(n)_ to the basic
Q67: Explain augmented reality and nanotechnology and review
Q68: Explain the steps in the "kill chain"
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents