1.

In __________ phase the hacker exploits the network or system vulnerabilities.

A. Scanning
B. Maintaining access
C. Reconnaissance
D. Gaining access
Answer» E.


Discussion

No Comment Found