ExamGecko
Question list
Search
Search

Question 45 - PCCET discussion

Report
Export

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

A.
weaponization
Answers
A.
weaponization
B.
reconnaissance
Answers
B.
reconnaissance
C.
exploitation
Answers
C.
exploitation
D.
delivery
Answers
D.
delivery
Suggested answer: A

Explanation:

'Weaponization: Next, attackers determine which methods to use to compromise a target endpoint. They may choose to embed intruder code within seemingly innocuous files such as a PDF or Microsoft Word document or email message.'

asked 23/09/2024
MARCONDES SANTOS
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first