Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 110 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 110
Topic #: 1
[All 312-50v12 Questions]

At what stage of the cyber kill chain theory model does data exfiltration occur?

  • A. Weaponization
  • B. Actions on objectives
  • C. Command and control
  • D. Installation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
qtygbapjpesdayazko
8 months, 3 weeks ago
Selected Answer: B
this is the way
upvoted 1 times
...
insaniunt
11 months ago
Selected Answer: B
B. Actions on objectives
upvoted 1 times
...
Kalegesa
11 months, 3 weeks ago
B.Actions on objectives
upvoted 1 times
...
Vincent_Lu
1 year, 4 months ago
Selected Answer: B
B. Actions on objectives
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: B
B. Actions on objectives
upvoted 1 times
...
jeremy13
1 year, 6 months ago
Selected Answer: B
B. Actions on objectives Like Q151 V11 Like Sausageman (CEH V12 Module 01 P21) Actions on Objectives is the last step of cyber kill chain
upvoted 2 times
...
sausageman
1 year, 7 months ago
Selected Answer: B
B. Actions on objectives CEH Book v12 Module 01 Page 14 "The adversary controls the victim’s system from a remote location and finally accomplishes their intended goals. The adversary gains access to confidential data, disrupts the services or network, or destroys the operational capability of the target by gaining access to its network and compromising more systems. Also, the adversary may use this as a launching point to perform other attacks."
upvoted 3 times
...
eli117
1 year, 7 months ago
Selected Answer: B
Answer: B Explanation: The cyber kill chain theory model is a seven-step model that describes the stages of a cyberattack. The seven steps are: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. Data exfiltration occurs during the sixth stage, which is actions on objectives. This stage involves the attacker taking the desired action, which can include data theft or destruction. The attacker may also attempt to cover their tracks to avoid detection.
upvoted 3 times
qtygbapjpesdayazko
8 months, 3 weeks ago
this is the way
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...