Which of the following describes the control stage when a hacker attacks a system? seenagape 11 years ago Which of the following describes the control stage when a hacker attacks a system? A.Manipulating a database B.Spreading to another system C.Reconfiguring network settings D.Discovering the system’s resources Explanation: ← Previous question Next question →