Coursera Answers

6.2.9 Check Your Understanding – Identify the Kill Chain Step Quiz Answer

6.2.9 Check Your Understanding - Identify the Kill Chain Step Quiz Answer

Cyber Threat Management

Digital Forensics and Incident Analysis and Response

in this article i am gone to share Cyber Threat Management | Digital Forensics and Incident Analysis and Response | 6.2.9 Check Your Understanding – Identify the Kill Chain Step Quiz Answer with you..


6.2.9 Check Your Understanding – Identify the Kill Chain Step

Identify the the steps in the cyber kill chain by answering the questions.


Gain Control

Question 1)

This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor exploit the vulnerability and gain control of the target?

  • reconnaissance
  • exploitation
  • delivery
  • action on objectives
  • installation



Weapon Transmitted

Question 2)

This is a multiple choice question. Once you have selected an option, select the submit button below

In which step is the weapon transmitted to the target through the use of a website, removable USB media, an email attachment, or by other means?

  • reconnaissance
  • installation
  • command and control
  • delivery
  • weaponization


Select Targets

Question 3)

This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor gather intelligence and select targets?

  • delivery
  • exploitation
  • action on objectives
  • installation
  • reconnaissance


IRC Method

Question 4)

This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?

  • action on objectives
  • command and control
  • weaponization
  • delivery
  • installation



Build a Tool

Question 5)

This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?

  • reconnaissance
  • weaponization
  • delivery
  • exploitation
  • command and control