Which of the following describes the control stage when a hacker attacks a system?

Which of the following describes the control stage when a hacker attacks a system?

Which of the following describes the control stage when a hacker attacks a system?

A.
Manipulating a database

B.
Spreading to another system

C.
Reconfiguring network settings

D.
Discovering the system’s resources

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *