Which stage of the cyber kill chain involves the attacker establishing a persistent presence within the target's environment to avoid detection and maintain access for future exploits?
Command and Control (C2)
Establishment of persistence
Actions on Objectives
Reconnaissance