List of questions
Related questions
Question 295 - 312-50v12 discussion
infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?
A.
Reconnaissance
B.
Maintaining access
C.
Scanning
D.
Gaining access
Your answer:
0 comments
Sorted by
Leave a comment first