New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-39 Exam - Topic 1 Question 75 Discussion

Actual exam question for Eccouncil's 312-39 exam
Question #: 75
Topic #: 1
[All 312-39 Questions]

In which phase of Lockheed Martin's -- Cyber Kill Chain Methodology, adversary creates a deliverable malicious payload using an exploit and a backdoor?

Show Suggested Answer Hide Answer
Suggested Answer: C


Contribute your Thoughts:

0/2000 characters
Lon
3 months ago
Yeah, Weaponization makes the most sense here!
upvoted 0 times
...
Sabina
3 months ago
Really? I always thought it was part of Exploitation.
upvoted 0 times
...
Elsa
3 months ago
No way, it's all about creating the payload in Weaponization.
upvoted 0 times
...
Roosevelt
4 months ago
I thought it was Delivery?
upvoted 0 times
...
Celia
4 months ago
It's definitely the Weaponization phase!
upvoted 0 times
...
Josefa
4 months ago
I thought Reconnaissance was just about gathering info, so it can't be that. I'm pretty sure it's either Weaponization or Exploitation.
upvoted 0 times
...
Cheryl
4 months ago
I'm leaning towards Weaponization too, but I could be mixing it up with Exploitation. It's confusing!
upvoted 0 times
...
Rickie
4 months ago
I remember practicing a question about the Cyber Kill Chain, and I feel like Delivery was more about sending the payload, not creating it.
upvoted 0 times
...
Salome
5 months ago
I think the phase where the adversary creates the payload is called Weaponization, but I'm not entirely sure.
upvoted 0 times
...
Alexis
5 months ago
I'm leaning towards Weaponization, but I'll double-check the details of each phase to make sure I have the right one.
upvoted 0 times
...
Dannie
5 months ago
Exploitation seems like the most likely answer here, since that's where the adversary uses the exploit and backdoor to gain access.
upvoted 0 times
...
Ruthann
5 months ago
The question mentions the adversary creating a deliverable malicious payload, so I think the answer is Delivery.
upvoted 0 times
...
Penney
5 months ago
Hmm, I'm a bit confused on this one. I'll need to think it through carefully to determine the right phase.
upvoted 0 times
...
Meghann
5 months ago
I'm pretty sure this is the Weaponization phase, where the adversary creates the malicious payload.
upvoted 0 times
...
Ryan
5 months ago
This looks like a straightforward question about infrastructure automation tools. I'm pretty familiar with Ansible, so I think I can tackle this one.
upvoted 0 times
...
Alishia
5 months ago
This looks like a compound interest problem with increasing annual contributions. I'll use the future value formula with escalating deposits.
upvoted 0 times
...
Blondell
5 months ago
This seems like a straightforward definition question. I'll read through the options carefully and try to identify the best one.
upvoted 0 times
...
Chaya
2 years ago
I think the correct answer is C) Weaponization because that's when the payload is made ready to be delivered.
upvoted 0 times
...
Mel
2 years ago
I see your point, but in the Delivery phase the payload is actually delivered to the target.
upvoted 0 times
...
Meaghan
2 years ago
I'm not so sure, I think it might be B) Delivery.
upvoted 0 times
...
Carmelina
2 years ago
I agree with Mel, in the Weaponization phase the adversary creates the malicious payload.
upvoted 0 times
...
Mel
2 years ago
I think the answer is C) Weaponization.
upvoted 0 times
...

Save Cancel