B. Actions on objectives
CEH Book v12 Module 01 Page 14
"The adversary controls the victim’s system from a remote location and finally accomplishes their intended goals. The adversary gains access to confidential data, disrupts the services or network, or destroys the operational capability of the target by gaining access to its network and compromising more systems. Also, the adversary may use this as a launching point to perform other attacks."
Answer: B
Explanation: The cyber kill chain theory model is a seven-step model that describes the stages of a cyberattack. The seven steps are: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. Data exfiltration occurs during the sixth stage, which is actions on objectives. This stage involves the attacker taking the desired action, which can include data theft or destruction. The attacker may also attempt to cover their tracks to avoid detection.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
qtygbapjpesdayazko
8 months, 3 weeks agoinsaniunt
11 months agoKalegesa
11 months, 3 weeks agoVincent_Lu
1 year, 4 months agovictorfs
1 year, 6 months agojeremy13
1 year, 6 months agosausageman
1 year, 7 months agoeli117
1 year, 7 months agoqtygbapjpesdayazko
8 months, 3 weeks ago