Question 11 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question 11 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question

DRAG DROP - Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

Select and Place:

Answer Area

vulnerability assessment

gathering information on a target for future use

persistence probing the target to discover operating system
details
exploit confirming the existence of known vulnerabilities

in the target system

cover tracks

using previoulsy identified vulnerabilities to gain
access to the target system

reconnaissance

inserting backdoor access or covert channels to
ensure access to the target system

enumeration

erasing traces of actions in audit logs and
registry entries

Explanations

Answer Area

vulnerability assessment persistence
persistence reconnaissance
exploit vulnerability assessment
cover tracks exploit
reconnaissance enumeration
enumeration cover tracks