Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 312-39 - Certified SOC Analyst (CSA v2)

Page: 2 / 6
Total 200 questions

In which phase of Lockheed Martin's – Cyber Kill Chain Methodology, adversary creates a deliverable malicious payload using an exploit and a backdoor?

A.

Reconnaissance

B.

Delivery

C.

Weaponization

D.

Exploitation

An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company’s URL as follows:

http://technosoft.com.com/ . Identify the attack demonstrated in the above scenario.

A.

Cross-site Scripting Attack

B.

SQL Injection Attack

C.

Denial-of-Service Attack

D.

Session Attack