Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?

IT Questions BankCategory: CCNA CyberOpsWhich activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?
Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain? 1Administrator Staff asked 4 months ago
50. Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?

  • Install a web shell on the target web server for persistent access.
  • Harvest email addresses of user accounts.
  • Open a two-way communication channel to the CnC infrastructure.
  • Obtain an automated tool to deliver the malware payload.

Explanation: In the installation phase of the Cyber Kill Chain, the threat actor establishes a back door into the system to allow for continued access to the target.

More Questions: CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Practice Final exam
More Questions: CCNA Cyber Ops Chapter 13 Exam Answers


Related Articles