Easy
|
Medium
|
Hard
Cyber Kill Chain - Hard
Enter the flag from the medium challenge here
Which step of the cyber kill chain would be mitigated by setting intrusion detection systems to alert on all new programs contacting the network?
Which step of the cyber kill chain would be mitigated by limiting the amount of publicly available company data?
Which step of the cyber kill chain would be mitigated by using anti-virus software?