Multiple Choice
What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases?
A) pivoting phase
B) scanning phase
C) exploitation phase
D) reconnaissance phase
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q25: A NIC can be assigned to more
Q26: The network ID is the same for
Q27: What is a trunk port, and why
Q28: What component serves as the core of
Q29: What virtualization product supports the use of
Q31: What feature, available in Windows 7 and
Q32: The process of storing a single copy
Q33: How does the use of a Storage
Q34: You have just turned on a virtual
Q35: What type of malware is a virus