List of questions
Related questions
Question 213 - CS0-003 discussion
Which of the following most accurately describes the Cyber Kill Chain methodology?
A.
It is used to correlate events to ascertain the TTPs of an attacker.
B.
It is used to ascertain lateral movements of an attacker, enabling the process to be stopped.
C.
It provides a clear model of how an attacker generally operates during an intrusion and the actions to take at each stage
D.
It outlines a clear path for determining the relationships between the attacker, the technology used, and the target
Your answer:
0 comments
Sorted by
Leave a comment first