In __________ phase the hacker exploits the network or system vulnerabilities.
(a) Scanning
(b) Maintaining access
(c) Reconnaissance
(d) Gaining access
The question was posed to me in examination.
I would like to ask this question from Generic Steps for Security topic in section Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,