A threat actor collects information from web servers of an organization and searches for employee contact information. The information collected is further used to search personal information on the Internet. To which attack phase do these activities belong according to the Cyber Kill Chain model?
- action on objectives
- exploitation
- reconnaissance
- weaponization
Explanation: According to the Cyber Kill Chain model, in the reconnaissance phase the threat actor performs research, gathers intelligence, and selects targets.
Exam with this question: CCNA Cyber Ops Chapter 13 Exam Answers
Exam with this question: Modules 26 - 28: Analyzing Security Data Group Exam
Please login or Register to submit your answer