Question 48 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question 48 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question

DRAG DROP - Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.

Select and Place:

Answer Area

not visible to the victim

reconnaissance

virus scanner turning off weaponization
malware placed on the targeted system delivery
open port scans and multiple failed logins exploitation
from the website
large amount of data leaving the network installation

through unusual ports

system phones connecting to countries
where no staff are located

command & control

USB with infected files inserted into
company laptop

actions on objectives

Explanations

Answer Area

not visible to the victim

system phones connecting to countries
where no staff are located

virus scanner turning off

malware placed on the targeted system

malware placed on the targeted system

not visible to the victim

open port scans and multiple failed logins
from the website

large amount of data leaving the network
through unusual ports

large amount of data leaving the network
through unusual ports

USB with infected files inserted into
company laptop

system phones connecting to countries
where no staff are located

virus scanner turning off

USB with infected files inserted into
company laptop

open port scans and multiple failed logins
from the website