Updated 2026 (Latest Version
Verified for Accuracy)
(Questions + Answers) Solved
100% Correct!!
Supply Chain BackDoor - 🧠 ANSWER ✔✔Combines 1st Stage Delivery
and Exploitation phases
Stuxnet: Host Observables - 🧠 ANSWER ✔✔DLL Injection: Lsass.exe,
winlogon.exe, svchost.exe
,Registry Key Modification: new registry: mrxnet, 19790509
Multiple Files Dropped: oem7a.pnf, mdmeric3.pnf, mrxnet.sys, mrxcls.sy
Infected Project File: S7tgtopx.exe
USB Jumping: USB Loader~WTR4141.tmp, Delete after 3 jumps
Sliding Scale of Cyber Security - 🧠 ANSWER ✔✔Architecture, Passive
Defense, Active Defense, Intelligence, Offense
Active Defense Influences - 🧠 ANSWER ✔✔Mao Zedong: On Guerrilla
Warfare
General Depuy: The Army's FM 100-5
Guiding Principles of Mao
1. No provocation of the enemy
2. No military bases on foreign soil
3. No seizure of enemy land
Active Cyber Defense Cycle - 🧠 ANSWER ✔✔Threat Intelligence
Consumption -> Visibility -> Threat Detection -> Incident Response ->
Threat & Environment Manipulation
, WinCC - 🧠 ANSWER ✔✔Siemens WinCC SCADA Monitoring was used to
sync - easily detectable on the network
What is intelligence? - 🧠 ANSWER ✔✔Both a Product and a Process:
Analyzed information about a competitive entity that fulfills a requirement
Intelligence Life Cycle - 🧠 ANSWER ✔✔1. Planning and Direction
2. Collection
3. Process and Exploitation
4. Analysis and Production
5. Dissemination and Integration
6. Evaluation and Feedback
Field of View Bias - 🧠 ANSWER ✔✔Operational Environment (location of
collection) and Intelligence Requirements yield a "field of view".
What is a threat? - 🧠 ANSWER ✔✔Threat can be established by evaluating
Capability + Intent + Opportunity.
1. Hostile Intent + Capability = impending
2. Capability + Opportunity = potential
COPYRIGHT©PROFFKERRYMARTIN 2025/2026. YEAR PUBLISHED 2026. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE.
PRIVACY STATEMENT. ALL RIGHTS RESERVED