List of questions
Related questions
Question 549 - 312-50v12 discussion
A cyber attacker has initiated a series of activities against a high-profile organization following the Cyber Kill
Chain Methodology. The attacker is presently in the "Delivery" stage. As an Ethical Hacker, you are trying to anticipate the adversary's next move. What is the most probable subsequent action from the attacker based on the Cyber Kill Chain Methodology?
A.
The attacker will attempt to escalate privileges to gain complete control of the compromised system.
B.
The attacker will exploit the malicious payload delivered to the target organization and establish a foothold.
C.
The attacker will initiate an active connection to the target system to gather more data.
D.
The attacker will start reconnaissance to gather as much information as possible about the target.
Your answer:
0 comments
Sorted by
Leave a comment first