Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 200-201 Topic 4 Question 81 Discussion

Actual exam question for Cisco's 200-201 exam
Question #: 81
Topic #: 4
[All 200-201 Questions]

A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Leslee
3 days ago
I'm with Coletta on this one. Exploiting the vulnerability to extract the passwords feels like the exploitation stage to me. Though I do see the arguments for reconnaissance and weaponization as well.
upvoted 0 times
...
Marti
4 days ago
What about delivery? The attacker is delivering a tailored worm to the target, right? That's gotta be part of the delivery stage, isn't it?
upvoted 0 times
...
Coletta
5 days ago
I'm leaning more towards the exploitation stage. The attacker is directly exploiting a known vulnerability in the software to extract the saved passwords. That seems like a clear-cut case of exploitation to me.
upvoted 0 times
...
Diego
6 days ago
Hmm, this seems like a tricky question. The attacker is clearly gathering information about the software flaw, which makes me think it's in the reconnaissance stage of the Cyber Kill Chain. But then they're tailoring a specific attack, which could be considered weaponization.
upvoted 0 times
...

Save Cancel