. Exploitation:
In this stage, attackers deploy an exploit against a vulnerable application or system, typically using an exploit kit or weaponized document.
I think the answer is B. An exploit is not malicious, but allows the attacker to get access to a system and then run malicious code. The definition of the installation stage is "Installation: Once they’ve established an initial foothold, attackers will install malware in order to conduct further operations, such as maintaining access, persistence and escalating privileges."
A is correct. https://www.paloaltonetworks.com/cyberpedia/how-to-break-the-cyber-attack-lifecycle
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.PCNSA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ada07
Highly Voted 3 years, 9 months agoHaryor
Most Recent 6 months agontir
1 year agort_85
1 year, 3 months agoblahblah1234567890000
2 years agoLetrange
2 years, 2 months agoblahblah1234567890000
2 years agodawlims
3 years ago