What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases?
A. pivoting phase
B. scanning phase
C. exploitation phase
D. reconnaissance phase
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following objects cannot trap mouse events?
a. JTextField. b. ButtonGroup. c. JButton. d. JComponent.
Computer Science & Information Technology
How would you suggest that mobile devices be secured?
What will be an ideal response?
Computer Science & Information Technology
Which of the following is NOT a Page Setup group option?
A) Alignment B) Breaks C) Size D) Orientation
Computer Science & Information Technology
Some routers have built-in firewall capabilities
Indicate whether the statement is true or false.
Computer Science & Information Technology