List of questions
Related questions
Question 58 - H12-724 discussion
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
A.
Planting malware
B.
Vulnerability attack
C.
Web application attacks
D.
Brute force
Your answer:
0 comments
Sorted by
Leave a comment first