In which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?

IT Questions BankCategory: CyberOps AssociateIn which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?

In which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?

  • command and control
  • action on objectives
  • installation
  • delivery
  • weaponization

Explanation: In the command and control stage, the threat actor uses a communication method such as IRC to issue commands to the malware that is installed on the target.

Exam with this question: 28.2.9 Check Your Understanding - Identify the Kill Chain Step

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments