Watch this video on YouTube
What is a typical action performed during the 'actions on objectives' phase of a cyber attack?