ExamGecko
Question list
Search
Search

Related questions











Question 300 - 200-201 discussion

Report
Export

A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?

A.

reconnaissance

Answers
A.

reconnaissance

B.

delivery

Answers
B.

delivery

C.

weaponization

Answers
C.

weaponization

D.

exploitation

Answers
D.

exploitation

Suggested answer: C

Explanation:

The category of the Cyber Kill Chain model that this event belongs to is weaponization. This stage occurs after reconnaissance has taken place and the attacker has discovered all necessary information about potential targets, such as vulnerabilities.In the weaponization stage, the attacker's preparatory work culminates in the creation of malware to be used against an identified target, which in this case is a specific worm tailored to exploit a software flaw and extract saved passwords.Reference:: The Cyber Kill Chain framework, developed by Lockheed Martin, explains the weaponization stage as the process where attackers create or modify cyber weapons based on the intelligence gathered during reconnaissance

asked 07/10/2024
Josh Rose
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first