List of questions
Related questions
Question 237 - 312-50v12 discussion
At what stage of the cyber kill chain theory model does data exfiltration occur?
A.
Actions on objectives
B.
Weaponization
C.
installation
D.
Command and control
Your answer:
0 comments
Sorted by
Leave a comment first