When dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)
- Conduct full malware analysis.
- Train web developers for securing code.
- Collect email and web logs for forensic reconstruction.
- Build detections for the behavior of known weaponizers.
- Perform regular vulnerability scanning and penetration testing.
Answers Explanation & Hints:
The most common exploit targets, once a weapon is delivered, are applications, operating system vulnerabilities, and user accounts. Among other measures, such as regular vulnerability scanning and penetration testing, training web developers in securing code can help block potential exploitations on systems. |