1.

Which of the following comes after scanning phase in ethical hacking?$

A. Scanning
B. Maintaining access
C. Reconnaissance
D. Gaining access
Answer» E.


Discussion

No Comment Found