During an incident response, an analyst applied rules to all inbound traffic on the border firewall and implemented ACLs on each critical server. Following an investigation, the company realizes it is still vulnerable because outbound traffic is not restricted, and the adversary is able to maintain a presence in the network.
In which of the following stages of the Cyber Kill Chain is the adversary currently operating?
stoneface
Highly Voted 2 years, 9 months agovarun0
Highly Voted 2 years, 9 months agoroukettas
Most Recent 11 months, 3 weeks ago[Removed]
1 year, 5 months agosaucehozz
1 year, 6 months agoPisces225
1 year, 4 months agoBroflovski
1 year, 6 months agoCyberjerry
1 year, 8 months agoIT__noob
1 year, 10 months agoTreeeSon
1 year, 9 months agodaddylonglegs
1 year, 8 months agocybertechb
1 year, 6 months agonarensnair
1 year, 10 months agoRevolutionaryAct
1 year, 10 months agodaddylonglegs
1 year, 8 months agoProtract8593
1 year, 11 months agoApplebeesWaiter1122
1 year, 11 months agoAbdul2107
2 years, 2 months agoC_M_M
2 years, 2 months agoVulturized
2 years, 1 month agoNishkurup
2 years, 3 months agoEricShon
2 years, 4 months agoronniehaang
2 years, 4 months ago