Which three aspects of a target system are most likely to be exploited after a weapon is delivered? (Choose three.)

IT Questions BankCategory: CCNA CyberOpsWhich three aspects of a target system are most likely to be exploited after a weapon is delivered? (Choose three.)

Which three aspects of a target system are most likely to be exploited after a weapon is delivered? (Choose three.)

  • Applications
  • User accounts
  • OS vulnerabilities
  • Existing backdoors
  • Domain name space
  • DHCP configurations

Explanation: The most common exploit targets, once a weapon is delivered, are applications, operating system vulnerabilities, and user accounts. Threat actors will use an exploit that gains the effect they desire, does it quietly, and avoids detection.

Exam with this question: CCNA Cyber Ops Chapter 13 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x