At which stage attacking the vulnerability belongs in Cyber kill chain?
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and control (C2)
- Actions on objectives
Exam with this question: CCNA SECOPS 210-255 Dumps – Certification Practice Exam Answers
Please login or Register to submit your answer