

MCQOPTIONS
Saved Bookmarks
1. |
In __________ phase the hacker exploits the network or system vulnerabilities. |
A. | Scanning |
B. | Maintaining access |
C. | Reconnaissance |
D. | Gaining access |
Answer» E. | |