Which among the following is the best example of the third step (delivery) in the cyber kill chain?
An intruder sends a malicious attachment via email to a target.
An intruder creates malware to be used as a malicious attachment to an email.
An intruder's malware is triggered when a target opens a malicious email attachment.
An intruder's malware is installed on a target's machine.
Submit