• Post author:
  • Post category:Updated
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

When dealing with security threats and using the Cyber Kill Chain model, which two approaches can an organization use to block a potential back door creation? (Choose two.)

  • Conduct damage assessment.
  • Establish an incident response playbook.
  • Consolidate the number of Internet points of presence.
  • Audit endpoints to discover abnormal file creations.
  • Use HIPS to alert or place a block on common installation paths.
Answers Explanation & Hints:

In the command and control phase of the Cyber Kill Chain, the threat actor establishes command and control (CnC) with the target system. With the two-way communication channel, the threat actor is able to issue commands to the malware software installed on the target.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 26 – 28: Analyzing Security Data Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments