asked 225k views
2 votes
During what phase of the Cyber Kill Chain does an attacker steal information, use computing resources, or alter information without permission?

A. Weaponization
B. Installation
C. Actions on Objectives
D. Command and Control

1 Answer

7 votes

Answer:

D

Step-by-step explanation:

I had got the same question too

answered
User Daniel Hardt
by
8.5k points