Exam4Training

At what cyber kill chain stage do attackers use malware to exploit specific software or hardware vulnerabilities on the target, based on the information retrieved at the reconnaissance stage?

At what cyber kill chain stage do attackers use malware to exploit specific software or hardware vulnerabilities on the target, based on the information retrieved at the reconnaissance stage?
A . Installation
B . Reconnaissance
C . Weaponization
D . Delivery

Answer: C

Exit mobile version