The first phase of the Intrusion Kill Chain is ________

Fill in the blank(s) with the appropriate word(s).


Answer: Reconnaissance. During this phase, an attacker takes some time to learn about the structure of an organization. An adversary can collect information about a target in many ways.

Computer Science & Information Technology

You might also like to view...

The base class's ________ affects the way its members are inherited by the derived class.

A) name B) return data type C) access specification D) both A and B E) None of the above

Computer Science & Information Technology

The computer component that collects data and sends it to the computer is called a(n) ____________.

a. storage device b. output device c. sending unit d. input device

Computer Science & Information Technology

Forms may include ________ controls, which are decorative or design elements, but not connected to a data source

Fill in the blank(s) with correct word

Computer Science & Information Technology

Link a file to a document if you plan to make changes within the document and have those changes reflected in the original file

Indicate whether the statement is true or false

Computer Science & Information Technology