InterviewSolution
Saved Bookmarks
| 1. |
Which of these is not a step followed by cyber-criminals in data breaching?(a) Research and info-gathering(b) Attack the system(c) Fixing the bugs(d) ExfiltrationI had been asked this question in semester exam.My query is from How Security Breach Takes Place topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct OPTION is (c) FIXING the bugs |
|