Which category as defined in the Diamond Model of Intrusion does this activity fall under?

A user on your network receives an email in their mailbox that contains a malicious attachment. There is no indication that the file was run. Which category as defined in the Diamond Model of Intrusion does this activity fall under?
A. reconnaissance
B. weaponization
C. delivery
D. installation

cisco-exams

7 thoughts on “Which category as defined in the Diamond Model of Intrusion does this activity fall under?

  1. This is not the diamond model – It is the Kill-chain model!
    C is correct:
    Delivery is the transmission of the payload to the target via a communication vector. Transmission can take many forms and most delivery techniques are uniquely tailored to the targeted individual or system.
    Delivery can be accomplished by some of the following methods:
    Email attachments
    Phishing emails
    Directing individuals to websites
    USB devices
    Delivery could occur but the user has not yet opened the attachment as it states that the file had not been run.

    1. these are not parts of the diamond model these are parts of the cyber kill chain. a lot of wrong answers in these mock tests

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.