ExamGecko
Question list
Search
Search

Related questions











Question 307 - 200-201 discussion

Report
Export

Which action matches the weaponization step of the Cyber Kill Chain model?

A.

Scan a host to find open ports and vulnerabilities

Answers
A.

Scan a host to find open ports and vulnerabilities

B.

Construct the appropriate malware and deliver it to the victim.

Answers
B.

Construct the appropriate malware and deliver it to the victim.

C.

Test and construct the appropriate malware to launch the attack

Answers
C.

Test and construct the appropriate malware to launch the attack

D.

Research data on a specific vulnerability

Answers
D.

Research data on a specific vulnerability

Suggested answer: B

Explanation:

The weaponization step in the Cyber Kill Chain model involves creating or repurposing malware based on the information gathered during reconnaissance to exploit vulnerabilities in the target's system.This step culminates in the preparation of the malware to be delivered to the victim2.

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Cyber Kill Chain

asked 07/10/2024
koffi .J N tsudze
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first