At which stage attacking the vulnerability belongs in Cyber kill chain?

IT Questions BankCategory: CCNA CyberOpsAt which stage attacking the vulnerability belongs in Cyber kill chain?

At which stage attacking the vulnerability belongs in Cyber kill chain?

  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and control (C2)
  • Actions on objectives

Exam with this question: CCNA SECOPS 210-255 Dumps – Certification Practice Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x