312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 10


You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email.

Which stage of the cyber kill chain are you at?

Show Answer
Correct Answer: B

In the cyber kill chain, the weaponization stage involves the creation or acquisition of a malicious payload, like a client-side backdoor, and preparing it for delivery to the target. Since you are creating a client-side backdoor to send to the employees via email, you are at the weaponization stage.

Discussion

16 comments
Sign in to comment
eli117Option: B
Apr 4, 2023

B. Weaponization The cyber kill chain is a framework that describes the different stages of a cyber attack. The stages of the kill chain are as follows: Reconnaissance Weaponization Delivery Exploitation Installation Command and Control Actions on Objectives In this scenario, the penetration tester has already completed the first stage of reconnaissance by harvesting the employees' email addresses from public sources. They are now in the second stage of weaponization, where they are creating a client-side backdoor and attaching it to an email in order to deliver it to the employees. The next stages of the kill chain would be delivery, where the email is sent to the employees, followed by exploitation, installation, and command and control, where the attacker gains access to the target system and establishes a channel for ongoing communication.

bellabopOption: B
Apr 9, 2023

B. Weaponization

HeyacedoGomezOption: B
Apr 18, 2023

Weaponization

nickfunOption: B
Sep 24, 2024

B. Weaponization his stage involves the creation or acquisition of a malicious payload, like a client-side backdoor, and preparing it for delivery to the target. In this scenario, you are creating a client-side backdoor to send to the employees via email, which is the weaponization stage.

teenwolf18
May 2, 2023

Weaponization

Vincent_Lu
Jun 11, 2023

B. Weaponization

ZacharyDriverOption: B
Jul 24, 2023

B. Weaponization

insaniuntOption: B
Nov 26, 2023

B. Weaponization are ***creating*** a client-side backdoor to send it to the employees via email.

mashhood
Jan 24, 2024

B. Weaponization

RizwannOption: B
Jul 6, 2023

Weaponisation

amy_trini
Oct 16, 2023

B. Weaponization

killwitchOption: B
Oct 16, 2023

B: Weapanization Weird that even though this is most voted answer I see selected D...

hejono5538Option: B
Oct 30, 2023

Weaponization

rayy48
Nov 10, 2023

Weaponization as well

kimsteveOption: B
Sep 24, 2024

Based on the vulnerabilities identified during analysis, the adversary selects or creates a tailored deliverable malicious payload (remote-access malware weapon) using an exploit and a backdoor to send it to the victim. An adversary may target specific network devices, operating systems, endpoint devices, or even individuals within the organization to carry out their attack.

Mann098Option: B
Dec 27, 2024

weponization as we have just created backdoors