Which component is NOT part of the Cyber Kill Chain Methodology?

Prepare for the Certified Ethical Hacker (CEHv13) exam with comprehensive study materials, flashcards, and multiple-choice questions. Learn with detailed hints and explanations to excel in your cyber security career!

The Cyber Kill Chain Methodology, developed by Lockheed Martin, outlines the stages of a cyber attack from the initial reconnaissance to the final objective of the attack. Each stage is designed to provide security professionals with a framework to identify and disrupt malicious activities at various points in the attack cycle.

The stages defined in the Cyber Kill Chain include:

  1. Reconnaissance: The attacker gathers information about the target.

  2. Weaponization: The attacker creates a deliverable payload, like a virus, coupled with an exploit.

  3. Delivery: The attacker transmits the weapon to the target.

  4. Exploitation: The attacker exploits the vulnerability to execute malicious code on the target’s system.

  5. Installation: The attacker installs malware on the target system.

  6. Command and Control (C2): The attacker establishes a communication channel with the compromised system.

  7. Actions on Objectives: The attacker performs their intended action, such as data theft or system disruption.

Monitoring, while it is a crucial component of a security strategy and aids in detecting and responding to threats, is not one of the defined stages within the Cyber Kill Chain. It is more of a continuous activity that supports overall security

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy