1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
2 years ago
5

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually hav

e protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed
Computers and Technology
1 answer:
tankabanditka [31]2 years ago
7 0

For this particular attempt, the last stage of the cyber kill chain that Josh performed is: Weaponize.

A cyber kill chain is also referred to as a cyber-attack chain and it can be defined as a series of steps that comprises the stages of a cyber attack. Thus, a cyber kill chain can be used to understand, trace and stop the sequence of events involved in a cyber attack.

Generally, a cyber kill chain comprises seven (7) main stages and these include:

1. Reconnaissance

2. Weaponize

3. Delivery

4. Exploit

5. Install

6. Callback

7. Persist

Weaponize simply involves choosing one or more attack vectors to begin an intrusion into a network system, after gathering sufficient information about the target.

In this scenario, the last stage of the cyber kill chain that Josh performed is weaponize because he decided to investigate other methods of intruding into the system, so as to send his file.

Read more: brainly.com/question/24112967

You might be interested in
Which game would be classified as an educational game
Masja [62]

Answer:

The various game types can be like board, video and card games. As far as educational video games are concerned they are made to explain to us some of the subjects which can be specific, as well as to teach a certain set of skills like role-playing. They are the interactive play that can help us learn the rules, goals, techniques to solve the problems. adaptation quality, as well as interactions, and all of these are being narrated in the form of a story. You should know that each game is a story in reality, and always. One can think of many such games, and like action games based on the military helps us learn how to fight a war.

Explanation:

Please check the answer.

7 0
4 years ago
The file extension for an MS Excel spreadsheet is ______.<br><br> avi or xls
anygoal [31]
XLS would be it, avi contains like sounds and stuff
6 0
3 years ago
Read 2 more answers
It is possible to play older console games such as those written for the nintendo game boy or sega genesis on a personal compute
timurjin [86]
Emulator««««that is the answer
5 0
3 years ago
75,15,25,5,15 what's next
Fittoniya [83]

Answer:

3

Explanation:

The sequence seems to follow a 2-step pattern.

1)Divide the first number by 5 to get the second number.

2)Add 10 to the second number to get the third number.

75/5 = 15

15 + 10 = 25

25/5 = 5

5 + 10 = 15

---> 15/5 = [3] (Answer)

3 0
3 years ago
What do computers use to represent on and off? 0 and 1 1 and 2 RGB Megabyte
rosijanka [135]
We use 0 to represent "off" and 1 to represent "on". Each one of the switches is a bit. A computer is called a "64-bit" computer if its registers are 64-bits long (loosely speaking). Eight switches in a row is a byte.
7 0
2 years ago
Other questions:
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    11·1 answer
  • Please Help!<br><br>in return brainliest and special thanks
    5·1 answer
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • Which of these is an aggregator?
    9·2 answers
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • )finding an unused location in the hash table is called
    5·1 answer
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Web design and development tools
    13·1 answer
  • How would you define the term technology
    8·1 answer
  • 1.<br> _g<br> clue: fret; become worried<br> 2.<br> Fret become worried
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!