ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 278 - CS0-003 discussion

Report
Export

Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the victim organization's endpoint security protections. Which of the following stages of the Cyber Kill Chain best aligns with the threat actor's actions?

A.
Delivery
Answers
A.
Delivery
B.
Reconnaissance
Answers
B.
Reconnaissance
C.
Exploitation
Answers
C.
Exploitation
D.
Weaponizatign
Answers
D.
Weaponizatign
Suggested answer: D

Explanation:

Weaponization is the stage of the Cyber Kill Chain where the threat actor creates or modifies a malicious tool to use against a target. In this case, the threat actor compiles and tests a malicious downloader, which is a type of weaponized malware.

Reference: Cybersecurity 101, The Cyber Kill Chain: The Seven Steps of a Cyberattack

asked 02/10/2024
Andres Romo
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first