Which of these is not a step followed by cyber-criminals in data breaching?
(a) Research and info-gathering
(b) Attack the system
(c) Fixing the bugs
(d) Exfiltration
I had been asked this question in semester exam.
My query is from How Security Breach Takes Place topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,