When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)
A.
Cover his tracks by eradicating the log files and audit trails.
B.
Gain access to the remote computer in order to conceal the venue of attacks.
C.
Perform a reconnaissance of the remote target for identical of venue of attacks.
D.
Always begin with a scan in order to quickly identify venue of attacks.
I choose
Ans is C – Perform a reconnaissance of the remote target for identification of venue of attacks