1.

In __________ phase the hacker exploits the network or system vulnerabilities.(a) Scanning(b) Maintaining access(c) Reconnaissance(d) Gaining accessThe question was posed to me in examination.I would like to ask this question from Generic Steps for Security topic in section Cyber Security of Cyber Security

Answer»

The correct CHOICE is (d) Gaining access

Easiest explanation: Penetration testers after SCANNING the SYSTEM or network tries to EXPLOIT the flaw of the system or network in “gaining access” phase.



Discussion

No Comment Found

Related InterviewSolutions