 
                 
                InterviewSolution
 Saved Bookmarks
    				| 1. | What is the second stage in cyber attack? | 
| Answer» At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and GAIN a PERSISTENT foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to ACCESS the corporate infrastructure and downloaded more tools to access the environment.Explanation:I HOPE it helps youplease mark me brainlist | |