cyber security help matching Match the phases of the cyber kill chain with the actions performed for that phase. Reconnaissance Weaponizing Delivery Exploitation Installation Command \& Control Action on Objective [Choose] Loading additional software/malware on a system Coupling exploits with backdoor vulnerabilities into a payload Exfiltration of customer list Exploiting a vulnerability to execute code on the victim's system Remote manipulation of victim's system Harvesting email addresses, IP address, user names Sending the weaponized bundle to the victim via email, website or usb.