List of questions
Related questions
Question 248 - 712-50 discussion
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
A.
Covering tracks
B.
Scanning and enumeration
C.
Maintaining Access
D.
Reconnaissance
E.
Gaining Access
F.
4, 2, 5, 3, 1
G.
2, 5, 3, 1, 4
H.
4, 5, 2, 3, 1
I.
4, 3, 5, 2, 1
Your answer:
0 comments
Sorted by
Leave a comment first