A user on your network receives an email in their mailbox that contains a malicious attachment. There is no indication that the file was run. Which category as defined in the Diamond Model of Intrusion does this activity fall under?
A. reconnaissance
B. weaponization
C. delivery
D. installation
The correct Answer is C.
Chapter 10, Page 261
Correct answer = C
C is the answer
This is not the diamond model – It is the Kill-chain model!
C is correct:
Delivery is the transmission of the payload to the target via a communication vector. Transmission can take many forms and most delivery techniques are uniquely tailored to the targeted individual or system.
Delivery can be accomplished by some of the following methods:
Email attachments
Phishing emails
Directing individuals to websites
USB devices
Delivery could occur but the user has not yet opened the attachment as it states that the file had not been run.
agreed
The correct Answer is C.
these are not parts of the diamond model these are parts of the cyber kill chain. a lot of wrong answers in these mock tests