Which of the following describes the control stage when a hacker attacks a system?
A.
Manipulating a database
B.
Spreading to another system
C.
Reconfiguring network settings
D.
Discovering the system’s resources
Explanation:
Which of the following describes the control stage when a hacker attacks a system?
Which of the following describes the control stage when a hacker attacks a system?
A.
Manipulating a database
B.
Spreading to another system
C.
Reconfiguring network settings
D.
Discovering the system’s resources
Explanation: