ExamGecko
Question list
Search
Search

Related questions











Question 438 - 312-50v12 discussion

Report
Export

Which among the following is the best example of the third step (delivery) in the cyber kill chain?

A.
An intruder sends a malicious attachment via email to a target.
Answers
A.
An intruder sends a malicious attachment via email to a target.
B.
An intruder creates malware to be used as a malicious attachment to an email.
Answers
B.
An intruder creates malware to be used as a malicious attachment to an email.
C.
An intruder's malware is triggered when a target opens a malicious email attachment.
Answers
C.
An intruder's malware is triggered when a target opens a malicious email attachment.
D.
An intruder's malware is installed on a target's machine.
Answers
D.
An intruder's malware is installed on a target's machine.
Suggested answer: A
asked 18/09/2024
Rik Ant
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first