اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 190 من 1040

كل الأسئلة

Which of the following most accurately describes the Cyber Kill Chain methodology?

الخيارات

  • A It is used to correlate events to ascertain the TTPs of an attacker.
  • B It is used to ascertain lateral movements of an attacker, enabling the process to be stopped.
  • C It provides a clear model of how an attacker generally operates during an intrusion and the actions to take at each stage.
  • D It outlines a clear path for determining the relationships between the attacker, the technology used, and the target.

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.