In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
A . weaponization
B . reconnaissance
C . exploitation
D . delivery

Answer: A

Explanation:

"Weaponization: Next, attackers determine which methods to use to compromise a target endpoint. They may choose to embed intruder code within seemingly innocuous files such as a PDF or Microsoft Word document or email message."

Latest PCCET Dumps Valid Version with 75 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments