Which action matches the weaponization step of the Cyber Kill Chain model?
A.
Scan a host to find open ports and vulnerabilities
B.
Construct the appropriate malware and deliver it to the victim.
C.
Test and construct the appropriate malware to launch the attack
D.
Research data on a specific vulnerability
The Answer Is:
B
This question includes an explanation.
Explanation:
The weaponization step in the Cyber Kill Chain model involves creating or repurposing malware based on the information gathered during reconnaissance to exploit vulnerabilities in the target’s system. This step culminates in the preparation of the malware to be delivered to the victim2.