Which is a correct description of a stage in the Lockheed Martin kill chain?
B
In the installation phase:
The malware creates a backdoor into the system through which the hacker can access the system.
D. In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.
Please log in or signup in order to use this feature
Please Enter 10 characters or more
In the installation phase:
The malware creates a backdoor into the system through which the hacker can access the system.
D. In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.