Exam 200-201 All QuestionsBrowse all questions from this exam
Question 274

A cyberattacker notices a security flaw in a software that a company is using. They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software. To which category of the Cyber Kill Chain model does this event belong?

    Correct Answer: A

    The event described involves creating a specific worm to exploit a security flaw and extract saved passwords. This process of creating malicious code specifically designed to exploit a vulnerability falls under the 'weaponization' category of the Cyber Kill Chain model. Weaponization involves developing the necessary tools to carry out an attack by leveraging identified vulnerabilities.

Discussion
fisher004Option: A

The attacker is tailoring a specific worm to exploit a security flaw and extract saved passwords from the software. I think it should be Weaponization

sheysheyOption: A

Should be A, my bad for previous comment

RoBeryOption: A

A- Weaponization

c79ecd3Option: A

It's A - this is the important bit "to tailor a specific worm to exploit this flaw and extract saved passwords"

Ben789456Option: A

answer A

Ben789456Option: A

A --> Weaponization

dnn_cbopsOption: A

I go with A

sheysheyOption: D

Agree sb D