List of questions
Related questions
Question 45 - PCCET discussion
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
A.
weaponization
B.
reconnaissance
C.
exploitation
D.
delivery
Your answer:
0 comments
Sorted by
Leave a comment first