List of questions
Related questions
Question 438 - 312-50v12 discussion
Which among the following is the best example of the third step (delivery) in the cyber kill chain?
A.
An intruder sends a malicious attachment via email to a target.
B.
An intruder creates malware to be used as a malicious attachment to an email.
C.
An intruder's malware is triggered when a target opens a malicious email attachment.
D.
An intruder's malware is installed on a target's machine.
Your answer:
0 comments
Sorted by
Leave a comment first