<< Prev Question Next Question >>

Question 7/17

Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *