adplus-dvertising
frame-decoration

Question

Grace is investigating a security incident where the attackers left USB drives containing infected files in the parking lot of an office building. What stage in the Cyber Kill Chain describes this action?

a.

Weaponization

b.

Installation

c.

Delivery

d.

Command and Control

Answer: (c).Delivery Explanation:Distributing infected media (or leaving it in a location where it is likely to be found) is an example of the Delivery phase of the Cyber Kill Chain. The process moves from Delivery into Installation if a user executes the malware on the device.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Grace is investigating a security incident where the attackers left USB drives containing infected files in the parking lot of an office building. What stage in the Cyber Kill...

Similar Questions

Discover Related MCQs

Q. During what phase of the Cyber Kill Chain does an attacker steal information, use computing resources, or alter information without permission?

Q. Which one of the following security assessment tools is not commonly used during the Information Gathering and Vulnerability Scanning phase of a penetration test?

Q. Beth recently conducted a phishing attack against a penetration testing target in an attempt to gather credentials that she might use in later attacks. What stage of the penetration testing process is Beth in?

Q. Which one of the following steps of the Cyber Kill Chain does not map to the Attacking and Exploiting stage of the penetration testing process?

Q. Rich recently got into trouble with a client for using an attack tool during a penetration test that caused a system outage. During what stage of the penetration testing process should Rich and his clients have agreed on the tools and techniques that he would use during the test?

Q. Which one of the following is not a reason to conduct periodic penetration tests of systems and applications?

Q. Which one of the following is not a benefit of using an internal penetration testing team?

Q. Assuming no significant changes in an organization’s cardholder data environment, how often does PCI DSS require that a merchant accepting credit cards conduct penetration testing?

Q. Edward Snowden gathered a massive quantity of sensitive information from the National Security Agency and released it to the media without permission. What type of attack did he wage?

Q. Brian ran a penetration test against a school’s grading system and discovered a flaw that would allow students to alter their grades by exploiting a SQL injection vulnerability. What type of control should he recommend to the school’s cybersecurity team to prevent students from engaging in this type of activity?

Q. Tom is running a penetration test in a web application and discovers a flaw that allows him to shut down the web server remotely. What goal of penetration testing has Tom most directly achieved?

Q. In which phase of the penetration testing process do testers share their findings with the target organization?

Q. What is an advantage of internal penetration testing teams?

Q. Why might penetration testing be conducted to meet regulatory requirements?

Q. What is one of the benefits of penetration testing?

Q. What goals do attackers seek to achieve, according to the DAD triad?

Q. What goals do cybersecurity professionals strive to achieve, according to the CIA triad?

Q. In penetration testing, what is the significance of adopting the hacker mindset?

Q. What is the purpose of CloudBrute in penetration testing?

Q. Which tool is a rule enforcement engine that allows the consistent application of security policies across cloud environments?