Finding out about current exploits about certain systems. This would fall under which aspect of information security?
A.Group of answer choices
B.Reconnaissance
C.Exploitation
D.Weaponize
E.Deliver
F.Action
G.Command & Control
H.Installation
Attempting to switch from a normal users to an admin user would be part of which step in the Attack Chain?
A.Deliver
B.Exploitation
C.Action
D.Installation
E.Reconnaissance
F.Weaponize
G.Command & Control
Instead of having your machine directly attack a victim machine, to have a less chance of getting caught, you set up an infrastructure in such a way that there is a chain of machines between you and the victim. This setup would be part of which step in the Attack Chain?
A.Reconnaissance
B.Deliver
C.Action
D.Exploitation
E.Weaponize
F.Command & Control
G.Installation
1.
Exploitation:
Finding out about current exploits about certain systems. This would fall under which aspect of information security.
Option c
2.
Command & Control:
Attempting to switch from a normal users to an admin user would be part of which step in the Attack Chain.
Option G
3.
Installation:
Instead of having your machine directly attack a victim machine, to have a less chance of getting caught, you set up an infrastructure in such a way that there is a chain of machines between you and the victim. This setup would be part of which step in the Attack Chain.
Option G
Get Answers For Free
Most questions answered within 1 hours.