1.

What is the second stage in cyber attack?

Answer»

At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and GAIN a PERSISTENT foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to ACCESS the corporate infrastructure and downloaded more tools to access the environment.Explanation:I HOPE it helps youplease mark me brainlist



Discussion

No Comment Found