Cyber Kill Chain
On the right of the white board are areas where cyber criminals can exploit weak controls to execute code.
- Drag the correct answers onto the white board.
- Each correct answer gets 1 point
- Each incorrect answer looses 1 point
EXPLOITATION is using a vulnerability in the target system to execute code.