When dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhen dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)

When dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)

  • Collect email and web logs for forensic reconstruction.
  • Conduct full malware analysis.
  • Train web developers for securing code.
  • Build detections for the behavior of known weaponizers.
  • Perform regular vulnerability scanning and penetration testing.

Explanation: The most common exploit targets, once a weapon is delivered, are applications, operating system vulnerabilities, and user accounts. Among other measures, such as regular vulnerability scanning and penetration testing, training web developers in securing code can help block potential exploitations on systems.

Exam with this question: CyberOps Associate (Version 1.0) - CyberOps Associate 1.0 Practice Final exam
Exam with this question: CCNA Cyber Ops Chapter 13 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments