CIW Exam Questions

Which of the following describes the control stage when a hacker attacks a system?

Which of the following describes the control stage when a hacker attacks a system?

A.
Manipulating a database

B.
Spreading to another system

C.
Reconfiguring network settings

D.
Discovering the system’s resources

Explanation: