Q: 13
How is attacking a vulnerability categorized?
Options
Discussion
Option C makes sense since exploitation is literally when the attacker takes advantage of a vulnerability. The other phases are about delivery, persistence or objectives, not the actual attack step. I think that's spot on but I'm open if anyone disagrees.
C here since exploitation is when someone actually attacks a weakness. Delivery and installation are different steps, not about hitting the vuln directly. Pretty confident but willing to hear counterpoints.
Pretty sure C here since exploitation is all about using vulnerabilities. The other phases come before or after this step in the attack lifecycle. Makes sense with what I've seen on Cisco practice too, but open to other takes.
B not A. Exploitation (C) is when attackers actually use a vuln, saw something similar in exam reports.
C matches the exploitation phase. No doubt on this one.
C That's the exploitation phase in the attack lifecycle. Pretty sure that's what Cisco expects here.
Be respectful. No spam.