100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
5 CISCOU Post Assessment Threat Analysis Questions and Answers 2025 $23.99
Add to cart

Exam (elaborations)

5 CISCOU Post Assessment Threat Analysis Questions and Answers 2025

 0 purchase
  • Course
  • Institution

5 CISCOU Post Assessment Threat Analysis Questions and Answers 2025

Preview 2 out of 14  pages

  • March 12, 2025
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Q1




Q2

Which two statements are true regarding the command-and-control (CnC) phase in the cyber kill
chain model? (Choose two.)

a. CnC is the process of the external threat actor beaconing inbound connec on to secure
servers or hosts in an organiza on to establish a communica on channel.
b. CnC is the process of the exploited hosts beaconing outbound or out of the network to an
Internet-based controller to establish a communica ons channel.
c. Once CnC is established with the exploited target, threat actors have access to the target
system and ul mately the en re network itself.
d. APT malware and most other forms of implants do not require manual interac on with the
target to begin the process of data exfiltra on or other reconnaissance ac ons that are
external to the outside network.

, Q3

Which two statements are true regarding the reconnaissance phase in the cyber kill chain model?
(Choose two.)

a. External to the network, threat actors review available informa on and resources about your
organiza on and public-facing network assets.
b. Poten al targets are selected when they are considered to be rela vely protected and
guarded.
c. Company websites, news ar cles, and social media can be used to develop a list of poten al
targets of network infiltra on vectors.
d. During the reconnaissance phase, threat actors will randomly select the target network.



Q4

Which two statements are true regarding the exploita on phase in the cyber kill chain model?
(Choose two.)

a. Selec on of the exploit is not important in the exploita on phase.
b. The exploita on phase describes what occurs once the malicious code is executed before the
weapon delivery.
c. Threat actors commonly exploit or target one of three cri cal weaknesses in the defensive
posture: an applica on, an opera ng system vulnerability, or the users.
d. When the exploit is conducted, the a acker “breaks” the vulnerability to gain control of the
machine.



Q5

Which two statements are true regarding the installa on or persistence phase in the cyber kill chain
model? (Choose two.)

a. This phase does not survive the system re-boots and the a ack needs to be ini ated again.
b. Sustained access generally provides the threat actor a way to access the system whenever
desired without aler ng the system users or network defenders.
c. Although the threat actor creates successful opera ons against the targeted host, individual
or network, the a ack cannot extend over a prolonged length of me.
d. The installa on phase (or persistence phase) describes ac ons taken by the threat actor to
establish a back door onto the targeted system.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Millenialnurse. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $23.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

70713 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling

Recently viewed by you


$23.99
  • (0)
Add to cart
Added