1.

While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.

A. Reconnaissance
B. Scanning
C. Gaining access
D. Maintaining access
Answer» C. Gaining access


Discussion

No Comment Found