Interview Question: How Would You Move Through KillChain? How Would You Defend It?

So guys, how would you answer the interview question "Walk me through how you would move through the Delivery Exploitation, Installation, C2, and Actions On Objectives phases of the cyber kill chain as well as how to prevent yourself from using those techniques".
B.Sc (Info. Systems), CISSP, CCNA, CCNP, Security+
Comments
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
Thanks for the additional links JD. Yeah, prior to the interview there are websites I hunted down that that mitigation steps for the LM Cyber Kill Chain however they were all preventative. It would be nice to learn of the controls as the threat is detected though. The link below shows the controls for the adversaries advance through the cyber kill chain (scroll down). These CKK phase-specific controls found throughout the web are part of some sort of Lockheed Martins action-matrix. Like I said though, they seem to be defense based and not something you would do during the incident.
Controls To Cyber Kill Chain