Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 200-201 Topic 3 Question 95 Discussion

Actual exam question for Cisco's 200-201 exam
Question #: 95
Topic #: 3
[All 200-201 Questions]

Which action matches the weaponization step of the Cyber Kill Chain Model?

Show Suggested Answer Hide Answer
Suggested Answer: A

The weaponization step in the Cyber Kill Chain Model involves the creation or use of a specific weapon (malware, exploit) designed to leverage a vulnerability.

This phase follows the reconnaissance phase where the attacker gathers information and precedes the delivery phase where the weapon is delivered to the target.

Developing specific malware to exploit a vulnerable server is a precise example of weaponization.


Lockheed Martin Cyber Kill Chain Model

Understanding the Weaponization Phase in Cyber Attacks

Steps in the Cyber Kill Chain

Contribute your Thoughts:

Valentine
2 months ago
I'm gonna have to go with B on this one. Gotta 'construct' that malware... kinda like building a house, but with more 'cyber' and less 'hammer.'
upvoted 0 times
...
Beckie
2 months ago
Option B all the way! It's like they say, 'the best defense is a good offense... and a really well-crafted piece of malware.'
upvoted 0 times
Deangelo
1 months ago
User 3: That's right, that's the weaponization step of the Cyber Kill Chain Model.
upvoted 0 times
...
Long
1 months ago
User 2: Construct the appropriate malware and deliver it to the victim.
upvoted 0 times
...
Steffanie
1 months ago
Option B all the way! It's like they say, 'the best defense is a good offense... and a really well-crafted piece of malware.'
upvoted 0 times
...
...
Tammara
2 months ago
Hmm, I'd say D is the way to go. Researching the vulnerability is key before you can even think about weaponizing it.
upvoted 0 times
Sabra
1 months ago
D) Research data on a specific vulnerability
upvoted 0 times
...
Kent
2 months ago
C) Test and construct the appropriate malware to launch the attack
upvoted 0 times
...
Tula
2 months ago
B) Construct the appropriate malware and deliver it to the victim.
upvoted 0 times
...
Noe
2 months ago
A) Scan a host to find open ports and vulnerabilities
upvoted 0 times
...
...
Quinn
3 months ago
I'm not sure, but I think D) Research data on a specific vulnerability could also be a valid option.
upvoted 0 times
...
Xuan
3 months ago
I'm going with C on this one. Can't launch the attack without properly testing the malware first, right?
upvoted 0 times
Geoffrey
2 months ago
I agree with Geoffrey. Without properly testing the malware, the attack may not be successful. C seems like the best option.
upvoted 0 times
...
Lawrence
2 months ago
I see your point, but I still believe C is the correct choice. Testing and constructing the malware is crucial before launching the attack.
upvoted 0 times
...
Nakisha
2 months ago
I think B is the right answer. You need to construct and deliver the malware to the victim to weaponize it.
upvoted 0 times
...
...
Celestina
3 months ago
I disagree, I believe the correct answer is C) Test and construct the appropriate malware to launch the attack.
upvoted 0 times
...
Sherell
3 months ago
Option B sounds like the best match to me. Gotta get that malware delivered to the victim for the attack to work!
upvoted 0 times
Precious
2 months ago
Yeah, without getting the malware to the victim, the attack wouldn't be successful.
upvoted 0 times
...
Jeniffer
2 months ago
I agree, delivering the malware is a crucial step in the Cyber Kill Chain Model.
upvoted 0 times
...
...
Audria
3 months ago
I think the answer is B) Construct the appropriate malware and deliver it to the victim.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77