What would be among the first steps that he would perform?

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)

A.
Cover his tracks by eradicating the log files and audit trails.

B.
Gain access to the remote computer in order to conceal the venue of attacks.

C.
Perform a reconnaissance of the remote target for identical of venue of attacks.

D.
Always begin with a scan in order to quickly identify venue of attacks.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


seenagape

seenagape

I choose

Mufaddal Taskin

Mufaddal Taskin

Ans is C – Perform a reconnaissance of the remote target for identification of venue of attacks