1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
2 years ago
5

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually hav

e protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed
Computers and Technology
1 answer:
tankabanditka [31]2 years ago
7 0

For this particular attempt, the last stage of the cyber kill chain that Josh performed is: Weaponize.

A cyber kill chain is also referred to as a cyber-attack chain and it can be defined as a series of steps that comprises the stages of a cyber attack. Thus, a cyber kill chain can be used to understand, trace and stop the sequence of events involved in a cyber attack.

Generally, a cyber kill chain comprises seven (7) main stages and these include:

1. Reconnaissance

2. Weaponize

3. Delivery

4. Exploit

5. Install

6. Callback

7. Persist

Weaponize simply involves choosing one or more attack vectors to begin an intrusion into a network system, after gathering sufficient information about the target.

In this scenario, the last stage of the cyber kill chain that Josh performed is weaponize because he decided to investigate other methods of intruding into the system, so as to send his file.

Read more: brainly.com/question/24112967

You might be interested in
In the past, workers would usually complete ______. a. A variety of tasks on a daily basis b. The same tasks every day c. Thinki
yKpoI14uk [10]

Answer:

B

Explanation:

did it on edge

5 0
3 years ago
Read 2 more answers
A presentation has bullet points that move. The presenter wants to use these bullet points in several other places in the presen
goldenfox [79]

Answer: Animation Painter.

In Microsoft Powerpoint, the most common method would be to simply animate each bullet point in the entire presentation. The Animation Painter is a tool that has been included to copy all the animations of a single object and apply them to another object selected.

How to use:

  1. Select the object with the animations already applied to.
  2. Click on the Animation Painter.
  3. Select the object that you would like to apply the animations to.
  4. Done.
6 0
3 years ago
A multi-national retail company has multiple business divisions with each division having its own AWS account. The engineering t
velikii [3]

Answer:

C. X-ray

Explanation:

AWS X-ray is a form of service that assists developers in carrying out analysis and debugging functions, and at the same time helps in the allotted applications, including those built using a microservices architecture.

In other words, an X-ray, in this case, will assist the developers in carrying out the following:

1. Establish a service map

2. Single out errors and bugs

3. Construct analysis and visualization apps

4. Enhancing the experience for end-users of the application under x-ray.

4 0
2 years ago
When forced distribution is used to reduce leniency bias, this can cause __________ if a pfp system is in place?
ziro4ka [17]
When forced distribution is used to reduce leniency bias, this can cause <decreased trust> between employees if a pfp system is in place.
3 0
3 years ago
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
3 years ago
Other questions:
  • Which aperture setting will give the shallowest depth of field?
    10·2 answers
  • On laptops, wireless cards tend to be attached to which panel?
    8·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A
    13·1 answer
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
    12·1 answer
  • How to send an email to multiple recipients individually outlook
    14·1 answer
  • What is output by the following line of code?
    15·1 answer
  • 8. Choose the 3 correct statements for the code below.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!