List of questions
Related questions
Question 300 - 200-201 discussion
A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?
A.
reconnaissance
B.
delivery
C.
weaponization
D.
exploitation
Your answer:
0 comments
Sorted by
Leave a comment first