In which step does the threat actor exploit the vulnerability and gain control of the target?
- reconnaissance
- action on objectives
- installation
- delivery
- exploitation
Explanation: In the exploitation stage, the threat actor exploits vulnerabilities and gains control of the target
Exam with this question: 28.2.9 Check Your Understanding - Identify the Kill Chain Step
Please login or Register to submit your answer