Certified Ethical Hacker v11 312-50v11 – Question151

At what stage of the cyber kill chain theory model does data exfiltration occur?

A.
Weaponization
B. Actions on objectives
C. Command and control
D. Installation

Correct Answer: B