In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
A . weaponization
B . reconnaissance
C . exploitation
D . delivery
Answer: A
Explanation:
"Weaponization: Next, attackers determine which methods to use to compromise a target endpoint. They may choose to embed intruder code within seemingly innocuous files such as a PDF or Microsoft Word document or email message."
Latest PCCET Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments