اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 382 من 427

كل الأسئلة

Josh has finished scanning a network and identified vulnerable services. He creates a malicious file disguised as a financial spreadsheet and drafts a spoofed email from the internal IT team, but before sending it he pauses to consider other delivery methods. For this attempt, what was the last stage of the cyber kill chain that Josh completed?

الخيارات

  • A Exploitation
  • B Weaponization‎
  • C Delivery
  • D Reconnaissance

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.