100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

5 CISCOU Post Assessment Threat Analysis Questions and Answers 2025

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
12-03-2025
Written in
2024/2025

5 CISCOU Post Assessment Threat Analysis Questions and Answers 2025

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
March 12, 2025
Number of pages
14
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Q1




Q2

Which two statements are true regarding the command-and-control (CnC) phase in the cyber kill
chain model? (Choose two.)

a. CnC is the process of the external threat actor beaconing inbound connec on to secure
servers or hosts in an organiza on to establish a communica on channel.
b. CnC is the process of the exploited hosts beaconing outbound or out of the network to an
Internet-based controller to establish a communica ons channel.
c. Once CnC is established with the exploited target, threat actors have access to the target
system and ul mately the en re network itself.
d. APT malware and most other forms of implants do not require manual interac on with the
target to begin the process of data exfiltra on or other reconnaissance ac ons that are
external to the outside network.

, Q3

Which two statements are true regarding the reconnaissance phase in the cyber kill chain model?
(Choose two.)

a. External to the network, threat actors review available informa on and resources about your
organiza on and public-facing network assets.
b. Poten al targets are selected when they are considered to be rela vely protected and
guarded.
c. Company websites, news ar cles, and social media can be used to develop a list of poten al
targets of network infiltra on vectors.
d. During the reconnaissance phase, threat actors will randomly select the target network.



Q4

Which two statements are true regarding the exploita on phase in the cyber kill chain model?
(Choose two.)

a. Selec on of the exploit is not important in the exploita on phase.
b. The exploita on phase describes what occurs once the malicious code is executed before the
weapon delivery.
c. Threat actors commonly exploit or target one of three cri cal weaknesses in the defensive
posture: an applica on, an opera ng system vulnerability, or the users.
d. When the exploit is conducted, the a acker “breaks” the vulnerability to gain control of the
machine.



Q5

Which two statements are true regarding the installa on or persistence phase in the cyber kill chain
model? (Choose two.)

a. This phase does not survive the system re-boots and the a ack needs to be ini ated again.
b. Sustained access generally provides the threat actor a way to access the system whenever
desired without aler ng the system users or network defenders.
c. Although the threat actor creates successful opera ons against the targeted host, individual
or network, the a ack cannot extend over a prolonged length of me.
d. The installa on phase (or persistence phase) describes ac ons taken by the threat actor to
establish a back door onto the targeted system.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Millenialnurse Freelance Tutor
Follow You need to be logged in order to follow users or courses
Sold
243
Member since
4 year
Number of followers
147
Documents
1463
Last sold
1 week ago
Genuine Study Guides 2024

Holla me for assistance 24/7.

3.4

36 reviews

5
16
4
4
3
4
2
2
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions