ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 8 Topic 1 Discussion

ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 8 Topic 1 Discussion

312-85 Exam Topic 1 Question 8 Discussion:
Question #: 8
Topic #: 1

Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.

Which of the following phases of cyber kill chain methodology is Jame executing?


A.

Reconnaissance


B.

Installation


C.

Weaponization


D.

Exploitation


Get Premium 312-85 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.