exam questions

Exam PCCET All Questions

View all questions & answers for the PCCET exam

Exam PCCET topic 1 question 40 discussion

Actual exam question from Palo Alto Networks's PCCET
Question #: 40
Topic #: 1
[All PCCET Questions]

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

  • A. weaponization
  • B. reconnaissance
  • C. exploitation
  • D. delivery
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 3 years ago
think this should be Weaponization
upvoted 8 times
error_909
2 years, 10 months ago
In weaponization, the hacker only identify the method, but in delivery it attach the hack to the innocent payload
upvoted 1 times
error_909
2 years, 10 months ago
igonre my comment please
upvoted 1 times
...
...
...
kirmanis
Most Recent 3 months, 4 weeks ago
Selected Answer: A
Pg 31 PCCET Study Guide While it's true that East-West traffic (traffic within a private cloud) might not be as exposed to external threats as North-South traffic (traffic between the private cloud and the internet), it's still crucial to protect it. Here's why: Internal threats: Even within a private cloud, there are risks of data breaches, unauthorized access, and other security incidents that can originate from internal sources. Data sensitivity: East-West traffic often involves sensitive data that needs to be protected from unauthorized access and disclosure. Compliance requirements: Many regulations and industry standards require organizations to implement strong security measures to protect their data, regardless of whether the traffic is internal or external.
upvoted 1 times
...
csco10320953
2 years ago
Weaponization -stage -Its only desire which type method to be identify Delivery -attach/insert the code/file So answer is :Delivery
upvoted 1 times
...
phil155
2 years, 4 months ago
Selected Answer: A
"Weaponization: Next, attackers determine which methods to use to compromise a target endpoint. They may choose to embed intruder code within seemingly innocuous files such as a PDF or Microsoft Word document or email message."
upvoted 2 times
...
blahblah1234567890000
2 years, 5 months ago
Selected Answer: A
Weaponization
upvoted 2 times
...
Merlin0o
2 years, 5 months ago
Selected Answer: A
Should be A, Page 39 study guide. Weaponization: They may choose to embed intruder code within seemingly innocuous files such as a PDF or Microsoft Word document Delivery: Attackers next attempt to deliver their weaponized payload to a target endpoint
upvoted 3 times
...
n3etw0
2 years, 8 months ago
A - page 39 of study guide
upvoted 4 times
...
error_909
2 years, 10 months ago
Selected Answer: D
In weaponization, the hacker only identify the method, but in delivery it attach the hack to the innocent payload
upvoted 3 times
error_909
2 years, 10 months ago
ITS A Sorry
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago