ExamGecko
Question list
Search
Search

Related questions











Question 248 - 712-50 discussion

Report
Export

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

A.
Covering tracks
Answers
A.
Covering tracks
B.
Scanning and enumeration
Answers
B.
Scanning and enumeration
C.
Maintaining Access
Answers
C.
Maintaining Access
D.
Reconnaissance
Answers
D.
Reconnaissance
E.
Gaining Access
Answers
E.
Gaining Access
F.
4, 2, 5, 3, 1
Answers
F.
4, 2, 5, 3, 1
G.
2, 5, 3, 1, 4
Answers
G.
2, 5, 3, 1, 4
H.
4, 5, 2, 3, 1
Answers
H.
4, 5, 2, 3, 1
I.
4, 3, 5, 2, 1
Answers
I.
4, 3, 5, 2, 1
Suggested answer: A
asked 18/09/2024
Ismaiel Al-Mufleh
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first