MCQOPTIONS
Saved Bookmarks
| 1. |
In __________ phase the hacker exploits the network or system vulnerabilities. |
| A. | Scanning |
| B. | Maintaining access |
| C. | Reconnaissance |
| D. | Gaining access |
| Answer» E. | |