What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases?

A. pivoting phase
B. scanning phase
C. exploitation phase
D. reconnaissance phase


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following objects cannot trap mouse events?

a. JTextField. b. ButtonGroup. c. JButton. d. JComponent.

Computer Science & Information Technology

How would you suggest that mobile devices be secured?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT a Page Setup group option?

A) Alignment B) Breaks C) Size D) Orientation

Computer Science & Information Technology

Some routers have built-in firewall capabilities

Indicate whether the statement is true or false.

Computer Science & Information Technology