exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 177 discussion

Actual exam question from Cisco's 200-201
Question #: 177
Topic #: 1
[All 200-201 Questions]

DRAG DROP -
Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
HarryPotter69
Highly Voted 3 years, 2 months ago
Google Figure 2: Original Lockheed Martin Cyber (Intrusion) Kill Chain - has a very nice image Based on that I would say Exploitation - The targeted Environment is taken advantage of triggering the threat actor's code Installation - Backdoor is placed on the victim system allowing the threat actor to maintain the persistence. Command and Control - An outbound connection is established to an Internet-based controller server. Actions and Objectives - The threat actor takes actions to violate data integrity and availability
upvoted 42 times
Silexis
10 months ago
At a second thought, I think that the provided solution is correct and you - as well as me - might be wrong. Backdoors are used for C2C and the initial malware installation - which is not a backdoor - has "called home" signaling the accomplish of its mission - system compromise. After that, a backdoor was deployed in order to assure persistence and C2C functionality for the attackers
upvoted 1 times
...
ethhacker
1 year, 2 months ago
Agreed.
upvoted 1 times
...
...
[Removed]
Highly Voted 3 years, 2 months ago
I agree with HarryPotter69. Correct answer is: 2,3,4,1 Exploitation - The targeted Environment is taken advantage of triggering the threat actor's code Installation - Backdoor is placed on the victim system allowing the threat actor to maintain the persistence. Command and Control - An outbound connection is established to an Internet-based controller server. Actions and Objectives - The threat actor takes actions to violate data integrity and availability
upvoted 10 times
...
alhamry
Most Recent 1 year, 7 months ago
Exploitation: The targeted environment is taken advantage of triggering the threat actor's code. (key words: ..taken advantage..). Installation: Backdoor is placed on the victim system allowing the threat actor to maintain the persistence. (key words: ..is placed on..). Command an Control: An outbound connection is established on an Internet-based controller server. (key words: ..controller server..). Actions an Objectives: The threat actor takes actions to violate data integrity and availability. (key words: ..takes actions to violate..).
upvoted 3 times
...
Eng_ahmedyoussef
2 years, 1 month ago
Lockheed Martin Cyber Kill Chain. 1. reconnaissance, 2.weaponization, 3.delivery, 4.exploitation, 5.installation, 6.command and control (C2), 7. actions on objectives Exploitation ==> The targeted Environment is taken advantage of triggering the threat actor's code. Installation ==> Backdoor is placed on the victim system allowing the threat actor to maintain the persistence. Command and Control ==> An outbound connection is established to an Internet-based controller server. Actions and Objectives ==> The threat actor takes actions to violate data integrity and availability
upvoted 3 times
...
COLCRISS
2 years, 5 months ago
Agrre with mr Harry Potter
upvoted 1 times
...
omita
2 years, 11 months ago
I agree with harryPotter69.
upvoted 1 times
...
CiscoTerminator
3 years, 1 month ago
2,3,41 is the correct answer
upvoted 3 times
...
anonymous1966
3 years, 2 months ago
For me, the right order is: 4,1,2,3
upvoted 3 times
...
qz999
3 years, 3 months ago
Agree with Barney_Stinson entry. Backdoor placement is installation and victim outbound connection would be to the CnC server. Middle two items are reversed in the answer given.
upvoted 4 times
...
Barney_Stinson
3 years, 6 months ago
The answer is shuffeled. e.g. the outbound connection is definitely CnC, not installation
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...