cisco

6.2.9 Check Your Understanding – Identify the Kill Chain Step Quiz Answer

Hello Friends in this article i am gone to share Cyber Threat Management | Digital Forensics and Incident Analysis and Response | 6.2.9 Check Your Understanding – Identify the Kill Chain Step Quiz Answer with you..

Digital Forensics and Incident Analysis and Response


Also visit this link:  6.1.5 Check Your Understanding


 

6.2.9 Check Your Understanding – Identify the Kill Chain Step

Identify the the steps in the cyber kill chain by answering the questions.

Gain Control

Question 1) This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor exploit the vulnerability and gain control of the target?

  • reconnaissance
  • exploitation
  • delivery
  • action on objectives
  • installation

 

Weapon Transmitted

Question 2) This is a multiple choice question. Once you have selected an option, select the submit button below

In which step is the weapon transmitted to the target through the use of a website, removable USB media, an email attachment, or by other means?

  • reconnaissance
  • installation
  • command and control
  • delivery
  • weaponization

 

Select Targets

Question 3) This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor gather intelligence and select targets?

  • delivery
  • exploitation
  • action on objectives
  • installation
  • reconnaissance

 

IRC Method

Question 4) This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?

  • action on objectives
  • command and control
  • weaponization
  • delivery
  • installation

 

Build a Tool

Question 5) This is a multiple choice question. Once you have selected an option, select the submit button below

In which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?

  • reconnaissance
  • weaponization
  • delivery
  • exploitation
  • command and control