In CEH v13 Module 06: Malware Threats, the Cyber Kill Chain is broken down into its seven stages:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control
Actions on Objectives
Step 3 – Delivery:
Refers to the transmission of the malicious payload to the victim.
Can occur through email, web downloads, USB drives, etc.
Correct Example:
A. “An intruder sends a malicious attachment via email to a target” — This is delivery.
Other Options:
B. Weaponization
C. Exploitation
D. Installation
[Reference:, Module 06 – Malware and Cyber Kill Chain Model, CEH Labs: Simulating Cyber Kill Chain Stages, , ]
Submit