• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

When dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)

  • Conduct full malware analysis.
  • Train web developers for securing code.
  • Collect email and web logs for forensic reconstruction.
  • Build detections for the behavior of known weaponizers.
  • Perform regular vulnerability scanning and penetration testing.
Answers Explanation & Hints:

The most common exploit targets, once a weapon is delivered, are applications, operating system vulnerabilities, and user accounts. Among other measures, such as regular vulnerability scanning and penetration testing, training web developers in securing code can help block potential exploitations on systems.

For more Questions and Answers:

CyberOps Associate v1.0 & CA 1.02 Practice Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments