Which the attacker can initiate malicious code against a targeted machine.

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

A. Exploitation
B. Installation
C. Reconnaissance
D. Act on Objective

Download Printable PDF. VALID exam to help you PASS.

One thought on “Which the attacker can initiate malicious code against a targeted machine.

  1. Exploitation. After a weaponized payload is delivered to a target endpoint, it must be triggered. An end user may unwittingly trigger an exploit, for example, by clicking a malicious link or opening an infected attachment in an email, or an attacker may remotely trigger an exploit against a known server vulnerability on the target network.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.