ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 213 - CS0-003 discussion

Report
Export

Which of the following most accurately describes the Cyber Kill Chain methodology?

A.
It is used to correlate events to ascertain the TTPs of an attacker.
Answers
A.
It is used to correlate events to ascertain the TTPs of an attacker.
B.
It is used to ascertain lateral movements of an attacker, enabling the process to be stopped.
Answers
B.
It is used to ascertain lateral movements of an attacker, enabling the process to be stopped.
C.
It provides a clear model of how an attacker generally operates during an intrusion and the actions to take at each stage
Answers
C.
It provides a clear model of how an attacker generally operates during an intrusion and the actions to take at each stage
D.
It outlines a clear path for determining the relationships between the attacker, the technology used, and the target
Answers
D.
It outlines a clear path for determining the relationships between the attacker, the technology used, and the target
Suggested answer: C

Explanation:

The Cyber Kill Chain methodology provides a clear model of how an attacker generally operates during an intrusion and the actions to take at each stage. It is divided into seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. It helps network defenders understand and prevent cyberattacks by identifying the attacker's objectives and tactics.Reference:The Cyber Kill Chain: The Seven Steps of a Cyberattack

asked 02/10/2024
Michael Crowson
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first