Which attack could an attacker use during the propagate phase of an attack?
A.
crash systems
B.
ping scans
C.
steal data
D.
erase files
E.
attack other targets
Explanation:
Which attack could an attacker use during the propagate phase of an attack?
Which attack could an attacker use during the propagate phase of an attack?
A.
crash systems
B.
ping scans
C.
steal data
D.
erase files
E.
attack other targets
Explanation: