List of questions
Related questions
Question 278 - CS0-003 discussion
Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the victim organization's endpoint security protections. Which of the following stages of the Cyber Kill Chain best aligns with the threat actor's actions?
A.
Delivery
B.
Reconnaissance
C.
Exploitation
D.
Weaponizatign
Your answer:
0 comments
Sorted by
Leave a comment first