• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?

  • Harvest email addresses of user accounts.
  • Obtain an automated tool to deliver the malware payload.
  • Open a two-way communication channel to the CnC infrastructure.
  • Install a web shell on the target web server for persistent access.
Answers Explanation & Hints:

In the installation phase of the Cyber Kill Chain, the threat actor establishes a back door into the system to allow for continued access to the target.

For more Questions and Answers:

CyberOps Associate v1.0 & CA 1.02 Practice Final Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments