Watch this video on YouTube
Which of the following is NOT an incident type that occurs during the Exploitation and Installation stage of the cyber kill chain?