For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeCPA®CPA ISC Practice Exam 5Question 41
    Medium1 markMultiple Choice
    Area II: SecurityThreatsKill ChainArea II

    CPA · Question 41 · Area II: Security

    Which stage of the 'Cyber Kill Chain' involves the attacker installing a backdoor or remote access trojan (RAT) to maintain access?

    Answer options:

    A.

    Reconnaissance

    B.

    Delivery

    C.

    Installation

    D.

    Actions on Objectives

    How to approach this question

    Match the action (installing backdoor) to the stage.

    Full Answer

    C.Installation✓ Correct
    Installation
    The Installation phase is where the attacker installs malware on the victim's system to ensure they can come back later (persistence).

    Common mistakes

    Confusing Delivery (sending the email) with Installation (malware running).
    Question 40All questionsQuestion 42

    Practice the full CPA ISC Practice Exam 5

    82 questions · hints · full answers · grading

    Sign up freeTake the exam

    More questions from this exam

    Q01A service organization provides a cloud-based payroll processing application to its user entities...MediumQ02An auditor is reviewing the shared responsibility model for a client using an Infrastructure as a...HardQ03A financial institution requires a cloud deployment model that offers the highest level of contro...MediumQ04During an IT audit, you observe that a company uses a 'Hybrid Cloud' architecture. Which scenario...MediumQ05Which component of IT architecture is primarily responsible for translating domain names (like ww...Easy
    View all 82 questions →