InterviewSolution
Saved Bookmarks
| 1. |
In __________ phase the hacker exploits the network or system vulnerabilities.(a) Scanning(b) Maintaining access(c) Reconnaissance(d) Gaining accessThe question was posed to me in examination.I would like to ask this question from Generic Steps for Security topic in section Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (d) Gaining access |
|