225k views
2 votes
During what phase of the Cyber Kill Chain does an attacker steal information, use computing resources, or alter information without permission?

A. Weaponization
B. Installation
C. Actions on Objectives
D. Command and Control

User ShakibaZar
by
8.9k points

1 Answer

7 votes

Answer:

D

Step-by-step explanation:

I had got the same question too

User Daniel Hardt
by
8.5k points