Comprehensive and Detailed Step-by-Step Explanation: Exploitationis the phase where testersleverage identified vulnerabilitiestogain unauthorized accessto systems. * Exploitation (Correct Answer - B) * Attackers use techniques such as SQL injection, buffer overflow, or privilege escalation. * Example:A tester exploits a weak password to gain admin access. * Exfiltration (Incorrect - A) * The process of stealing dataaftergaining access. * Reconnaissance (Incorrect - C) * The initial stage where attackers gather information about the target. * Scanning (Incorrect - D) * Involves identifying open ports and services but does not involve actual attacks. References: * ISACA CISA Review Manual * NIST 800-115 (Technical Guide to Security Testing)