Certified Ethical Hacker v11 312-50v11 – Question151 At what stage of the cyber kill chain theory model does data exfiltration occur?A. WeaponizationB. Actions on objectivesC. Command and controlD. Installation Show Answer Hide Answer Correct Answer: B Post navigation Certified Ethical Hacker v11 312-50v11 – Question150Certified Ethical Hacker v11 312-50v11 – Question152