1. In which step does the threat actor exploit the vulnerability and gain control of the target?
- reconnaissance
- action on objectives
- installation
- delivery
- exploitation
2. In which step is the weapon transmitted to the target through the use of a website, removable USB media, an email attachment, or by other means?
- reconnaissance
- delivery
- installation
- command and control
- weaponization
3. In which step does the threat actor gather intelligence and select targets?
- delivery
- action on objectives
- exploitation
- reconnaissance
- installation
4. In which step does the threat actor use a communication method such as IRC to issue commands to the software that is installed on the target?
- command and control
- action on objectives
- installation
- delivery
- weaponization
5. In which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?
- exploitation
- delivery
- reconnaissance
- command and control
- weaponization