Which three aspects of a target system are most likely to be exploited after a weapon is delivered? (Choose three.)
- Applications
- User accounts
- OS vulnerabilities
- Existing backdoors
- Domain name space
- DHCP configurations
Explanation: The most common exploit targets, once a weapon is delivered, are applications, operating system vulnerabilities, and user accounts. Threat actors will use an exploit that gains the effect they desire, does it quietly, and avoids detection.
Exam with this question: CCNA Cyber Ops Chapter 13 Exam Answers
Please login or Register to submit your answer