Which Kill Chain stage describes the attacker gaining access to confidential data, disrupting services, or destroying operational capability after compromising the network?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which Kill Chain stage describes the attacker gaining access to confidential data, disrupting services, or destroying operational capability after compromising the network?

Explanation:
The main idea is the stage where the attacker uses the access they gained to achieve their goals. This is Actions on Objectives: after compromising the network, the attacker aims to realize impact—getting confidential data, disrupting services, or destroying operational capability. That focus on impact and outcomes after access is established distinguishes this stage from earlier steps. Reconnaissance is about gathering information before any attack, exploitation is about breaking in to gain initial access, and delivery is about getting the malicious code onto the target. So, this stage best fits the described scenario because it centers on the results the attacker seeks once inside.

The main idea is the stage where the attacker uses the access they gained to achieve their goals. This is Actions on Objectives: after compromising the network, the attacker aims to realize impact—getting confidential data, disrupting services, or destroying operational capability. That focus on impact and outcomes after access is established distinguishes this stage from earlier steps. Reconnaissance is about gathering information before any attack, exploitation is about breaking in to gain initial access, and delivery is about getting the malicious code onto the target. So, this stage best fits the described scenario because it centers on the results the attacker seeks once inside.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy