Cyber Kill Chain Exploitation On the right of the white board are areas where cyber criminals can exploit weak controls to execute code.Drag the correct answers onto the white board.Each correct answer gets 1 pointEach incorrect answer looses 1 point EXPLOITATION is using a vulnerability in the target system to execute code. Reconnaissance Weaponisation Delivery Exploitation Installation Command and Control Action on Objectives Payment options Please enter the security code Security Code (lowercase letters) Submit