Its C. Cyber kill chain specifically breaks down attacks into seven stages from start to finish. MITRE ATT&CK lists techniques but doesn't use those phases, so it's a common trap option here. Are they asking for a phase-based model, or just for attack technique mapping? That would flip it.
Q: 6
A company is moving its applications to the cloud and is concerned about cyber security threats. The
security team has been tasked with providing a comprehensive view of how attackers gainaccess,
move through networks, and carry out attacks.
Which framework identifies the seven phases of an attack, from initial infiltration to post-
exploitation?
Options
Discussion
Be respectful. No spam.
Question 6 of 30