1.

Which of these is not a step followed by cyber-criminals in data breaching?

A. Research and info-gathering
B. Attack the system
C. Fixing the bugs
D. Exfiltration
Answer» D. Exfiltration


Discussion

No Comment Found