In which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?
- command and control
- action on objectives
- installation
- delivery
- weaponization
Explanation: In the command and control stage, the threat actor uses a communication method such as IRC to issue commands to the malware that is installed on the target.
Exam with this question: 28.2.9 Check Your Understanding - Identify the Kill Chain Step
Please login or Register to submit your answer