1.

In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?

A. Scanning
B. Maintaining access
C. Maintaining Access
D. Gaining access
Answer» D. Gaining access


Discussion

No Comment Found