In which step does the threat actor exploit the vulnerability and gain control of the target?

IT Questions BankCategory: CyberOps AssociateIn which step does the threat actor exploit the vulnerability and gain control of the target?

In which step does the threat actor exploit the vulnerability and gain control of the target?

  • reconnaissance
  • action on objectives
  • installation
  • delivery
  • exploitation

Explanation: In the exploitation stage, the threat actor exploits vulnerabilities and gains control of the target

Exam with this question: 28.2.9 Check Your Understanding - Identify the Kill Chain Step

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments