6.2.9 Check Your Understanding – Identify the Kill Chain Step Quiz Answer
Hello Friends in this article i am gone to share Cyber Threat Management | Digital Forensics and Incident Analysis and Response | 6.2.9 Check Your Understanding – Identify the Kill Chain Step Quiz Answer with you..
Digital Forensics and Incident Analysis and Response
Also visit this link: 6.1.5 Check Your Understanding
6.2.9 Check Your Understanding – Identify the Kill Chain Step
Identify the the steps in the cyber kill chain by answering the questions.
Gain Control
Question 1) This is a multiple choice question. Once you have selected an option, select the submit button below
In which step does the threat actor exploit the vulnerability and gain control of the target?
- reconnaissance
- exploitation
- delivery
- action on objectives
- installation
Weapon Transmitted
Question 2) This is a multiple choice question. Once you have selected an option, select the submit button below
In which step is the weapon transmitted to the target through the use of a website, removable USB media, an email attachment, or by other means?
- reconnaissance
- installation
- command and control
- delivery
- weaponization
Select Targets
Question 3) This is a multiple choice question. Once you have selected an option, select the submit button below
In which step does the threat actor gather intelligence and select targets?
- delivery
- exploitation
- action on objectives
- installation
- reconnaissance
IRC Method
Question 4) This is a multiple choice question. Once you have selected an option, select the submit button below
In which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?
- action on objectives
- command and control
- weaponization
- delivery
- installation
Build a Tool
Question 5) This is a multiple choice question. Once you have selected an option, select the submit button below
In which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?
- reconnaissance
- weaponization
- delivery
- exploitation
- command and control