Skip to content

Certified Ethical Hacker v11 312-50v11

  • Certified Ethical Hacker v11 312-50v11

Tag: Question 151

Certified Ethical Hacker v11 312-50v11 – Question151

At what stage of the cyber kill chain theory model does data exfiltration occur?

A.
Weaponization
B. Actions on objectives
C. Command and control
D. Installation

Correct Answer: B

Tagged Certified Ethical Hacker v11 312-50v11, Question 151
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!