what would be the first step the attacker would perform?

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be the first step the attacker would perform?

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be the first step the attacker would perform?

A.
Cover his tracks by eradicating the log files

B.
Gain access to the remote computer for identification of venue of attacks

C.
Perform a reconnaissance of the remote target for identification of venue of attacks

D.
Always starts with a scan in order to quickly identify venue of attacks



Leave a Reply 0

Your email address will not be published. Required fields are marked *