Which category as defined in the Diamond Model of Intrusion does this activity fall under?

A user on your network receives an email in their mailbox that contains a malicious attachment. There is no indication that the file was run. Which category as defined in the Diamond Model of Intrusion does this activity fall under?
A. reconnaissance
B. weaponization
C. delivery
D. installation

cisco-exams

7 thoughts on “Which category as defined in the Diamond Model of Intrusion does this activity fall under?

  1. First all, Diamond Mode of intrusion ???? I believe that is Kill Chain Model.
    And the answer is C.
    Delivery is the transmission of the payload to the target via a communication vector. Delivery can be accomplished by some of the following methods:
    • Email attachments
    • Phishing emails
    • Directing individuals to websites
    • USB devices

  2. well l beg to differ with everyone….the answer is A…I am thinking if the file has been dropped and t is a malware..this will only be executed when the user clicks on the file and that malware then would connect to the CnC server blah blah….so we are still at the Information Gathering…

    otherwise do you you mean to sae that all the emails you recieve in your spam folders are all at delivery stages????? I actually think the hacker has not yet started the job here..He is still looking for information and ways to attack.. you clicking the file will make you a weak likn in the system thus you become a vulnerability the hacker will use…lol…you are the weakest point by your ignorance…

    think aboout it guys!!!!

    1. sorry guys…I agree with C…..jus after criticall thinking of it all…considering the fact that weaponization has also been done…the malware!!..

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.