An attacker has just installed a root kit on a system. Which of the following stages of the hacker
process has this hacker completed?
A.
Attack
B.
Control
C.
Discovery
D.
Penetration
Explanation:
An attacker has just installed a root kit on a system. Which of the following stages of the hacker
process has this hacker completed?
An attacker has just installed a root kit on a system. Which of the following stages of the hacker
process has this hacker completed?
A.
Attack
B.
Control
C.
Discovery
D.
Penetration
Explanation: