ExamGecko
Question list
Search
Search

Related questions











Question 330 - 200-201 discussion

Report
Export

Which action matches the weaponization step of the Cyber Kill Chain Model?

A.

Develop a specific malware to exploit a vulnerable server, i

Answers
A.

Develop a specific malware to exploit a vulnerable server, i

B.

Match a known script to a vulnerability.

Answers
B.

Match a known script to a vulnerability.

C.

Construct a trojan and deliver l! to the victim.

Answers
C.

Construct a trojan and deliver l! to the victim.

D.

Scan open services and ports on a server.

Answers
D.

Scan open services and ports on a server.

Suggested answer: A

Explanation:

The weaponization step in the Cyber Kill Chain Model involves the creation or use of a specific weapon (malware, exploit) designed to leverage a vulnerability.

This phase follows the reconnaissance phase where the attacker gathers information and precedes the delivery phase where the weapon is delivered to the target.

Developing specific malware to exploit a vulnerable server is a precise example of weaponization.

Lockheed Martin Cyber Kill Chain Model

Understanding the Weaponization Phase in Cyber Attacks

Steps in the Cyber Kill Chain

asked 07/10/2024
Epitacio Neto
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first