Select from the option list provided the stage of cyberattack described in each item below. Each choice may be used once, more than once, or not at all.
1) Exploration
2) Reconnaissance
3) Exploitation
4) Evasion
5) Persistence
6) Privilege Escalation
7) Installation
8) Command and Control
9) Exfiltration
10) Covering Tracks
11) Backdoor