Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HP Exam HPE6-A78 Topic 7 Question 39 Discussion

Actual exam question for HP's HPE6-A78 exam
Question #: 39
Topic #: 7
[All HPE6-A78 Questions]

Which is a correct description of a stage in the Lockheed Martin kill chain?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Arthur
21 days ago
You know what they say - the only way to win the game is not to play. Or in this case, not to get hacked.
upvoted 0 times
...
Armando
23 days ago
I hear the Lockheed Martin kill chain is a real killer. Ba dum tss!
upvoted 0 times
...
Blondell
30 days ago
Option A sounds like it's describing the delivery stage, not the reconnaissance stage. This question is making my head spin!
upvoted 0 times
Doretha
4 days ago
I agree, option A is definitely about the delivery stage.
upvoted 0 times
...
Keneth
21 days ago
I think option A is correct, it describes the delivery stage.
upvoted 0 times
...
...
Kayleigh
1 months ago
Option B is just silly. The hacker would assess the impact before, not after, the attack.
upvoted 0 times
Temeka
3 days ago
User 3: So, which option do you think is the correct description of a stage in the Lockheed Martin kill chain?
upvoted 0 times
...
Lamar
5 days ago
User 2: I think you're right. It makes more sense for the hacker to assess the impact before launching the attack.
upvoted 0 times
...
Adelle
15 days ago
User 1: Option B is just silly. The hacker would assess the impact before, not after, the attack.
upvoted 0 times
...
...
Trina
2 months ago
I'm pretty sure Option C is wrong. The weaponization stage happens before the malware is delivered, not after.
upvoted 0 times
Paulene
2 days ago
User 3: I'm not sure about that. I think Option B is the right choice. Reconnaissance stage assesses the impact of the attack.
upvoted 0 times
...
Simona
17 days ago
User 2: I disagree. I believe Option D is the correct description. Exploitation and installation phases create a backdoor for the hacker.
upvoted 0 times
...
Julio
25 days ago
User 1: I think Option A is correct. The delivery stage is when malware collects data and sends it to the hacker.
upvoted 0 times
...
Maricela
1 months ago
User 2: I agree, the malware collects data and delivers it to the hacker in that stage.
upvoted 0 times
...
Edelmira
1 months ago
User 1: I think Option A is the correct description of the delivery stage.
upvoted 0 times
...
...
Dylan
2 months ago
Option D definitely sounds like the correct description of the exploitation and installation phases. The hacker would need to create a backdoor to maintain access to the infected system.
upvoted 0 times
...
Aide
2 months ago
But in the exploitation and installation phases, malware creates a backdoor, which fits D.
upvoted 0 times
...
Judy
2 months ago
I disagree, I believe it's A.
upvoted 0 times
...
Aide
2 months ago
I think the correct description is D.
upvoted 0 times
...

Save Cancel