ExamGecko
Question list
Search
Search

Question 83 - PCDRA discussion

Report
Export

Which of the following represents a common sequence of cyber-attack tactics?

A.
Actions on the objective Reconnaissance Weaponization & Delivery Exploitation Installation Command & Control
Answers
A.
Actions on the objective Reconnaissance Weaponization & Delivery Exploitation Installation Command & Control
B.
Installation >> Reconnaissance Weaponization & Delivery Exploitation Command & Control Actions on the objective
Answers
B.
Installation >> Reconnaissance Weaponization & Delivery Exploitation Command & Control Actions on the objective
C.
Reconnaissance Weaponization & Delivery Exploitation Installation Command & Control Actions on the objective
Answers
C.
Reconnaissance Weaponization & Delivery Exploitation Installation Command & Control Actions on the objective
D.
Reconnaissance >> Installation Weaponization & Delivery Exploitation Command & Control Actions on the objective
Answers
D.
Reconnaissance >> Installation Weaponization & Delivery Exploitation Command & Control Actions on the objective
Suggested answer: C

Explanation:

A common sequence of cyber-attack tactics is based on the Cyber Kill Chain model, which describes the stages of a cyber intrusion from the perspective of the attacker. The Cyber Kill Chain model consists of seven phases: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on the objective. These phases are briefly explained below:

Reconnaissance: The attacker gathers information about the target, such as its network, systems, vulnerabilities, employees, and business operations. The attacker may use various methods, such as scanning, phishing, or searching open sources, to collect data that can help them plan the attack.

Weaponization: The attacker creates or obtains a malicious payload, such as malware, exploit, or script, that can be used to compromise the target. The attacker may also embed the payload into a delivery mechanism, such as an email attachment, a web link, or a removable media.

Delivery: The attacker sends or delivers the weaponized payload to the target, either directly or indirectly. The attacker may use various channels, such as email, web, or physical access, to reach the target's network or system.

Exploitation: The attacker exploits a vulnerability or weakness in the target's network or system to execute the payload. The vulnerability may be technical, such as a software flaw, or human, such as a social engineering trick.

Installation: The attacker installs or drops additional malware or tools on the target's network or system to establish a foothold and maintain persistence. The attacker may use various techniques, such as registry modification, file manipulation, or process injection, to hide their presence and evade detection.

Command and Control: The attacker establishes a communication channel between the compromised target and a remote server or controller. The attacker may use various protocols, such as HTTP, DNS, or IRC, to send commands and receive data from the target.

Actions on the objective: The attacker performs the final actions that achieve their goal, such as stealing data, destroying files, encrypting systems, or disrupting services. The attacker may also try to move laterally within the target's network or system to access more resources or data.

Cyber Kill Chain: This document explains the Cyber Kill Chain model and how it can be used to analyze and respond to cyberattacks.

Cyber Attack Tactics: This document provides an overview of some common cyber attack tactics and examples of how they are used by threat actors.

asked 23/09/2024
Marcin Golec
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first