{"id":3280,"date":"2023-12-03T18:49:17","date_gmt":"2023-12-03T18:49:17","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question054\/"},"modified":"2023-12-03T18:49:17","modified_gmt":"2023-12-03T18:49:17","slug":"comptia-security-sy0-601-question054","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question054\/","title":{"rendered":"CompTIA Security+ SY0-601 &#8211; Question054"},"content":{"rendered":"<div class=\"question\">During an incident response, an analyst applied rules to all inbound traffic on the border firewall and<br \/>\nimplemented ACLs on each critical server. Following an investigation, the company realizes it is still vulnerable<br \/>\nbecause outbound traffic is not restricted, and the adversary is able to maintain a presence in the network. In<br \/>\nwhich of the following stages of the Cyber Kill Chain is the adversary currently operating?<br \/>\n<br \/><strong><br \/>A.<\/strong> Reconnaissance<br \/><strong>B.<\/strong> Command and control<br \/><strong>C.<\/strong> Actions on objective<br \/><strong>D.<\/strong> Exploitation<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>During an incident response, an analyst applied rules to all inbound traffic on the border firewall and implemented ACLs on each critical server. Following an investigation, the company realizes it is still vulnerable because outbound traffic is not restricted, and the adversary is able to maintain a presence in the network. In which of the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,57],"class_list":["post-3280","post","type-post","status-publish","format-standard","hentry","category-comptia-security-sy0-601","tag-comptia-security-sy0-601","tag-question-054"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/comments?post=3280"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3280\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/media?parent=3280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/categories?post=3280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/tags?post=3280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}