Multiple Choice
Which of the following reflects the correct sequence of the three steps of the cyber-kill chain?
A) Gather information about the network, access the network, disrupt the network
B) Access the network, gather information about the network, disrupt the network
C) Access the network, disrupt the network, gather information about the network
D) Disrupt the network, gather information about the network, access the network
Correct Answer:

Verified
Correct Answer:
Verified
Q22: What is accidental tailgating?<br>A) Unauthorized users are
Q23: The National Institute of Standards and Technology
Q24: What step do reconnaissance attacks correspond to
Q25: A business can protect itself from DoS
Q26: RAM Manufacturing LLC is a rapidly growing
Q28: What is a Malware attack?<br>A) An attack
Q29: The National Institute of Standards and Technology
Q30: At larger companies, the cybersecurity program is
Q31: Match the cybersecurity threat to the following
Q32: The National Institute of Standards and Technology