PrepAway - Latest Free Exam Questions & Answers

which of the following stages of the hacker process does this activity belong?

An attacker has used a malformed UDP packet to elicit a response from a system and leave
behind a root shell. To which of the following stages of the hacker process does this activity
belong?

PrepAway - Latest Free Exam Questions & Answers

A.
Penetration

B.
Discovery

C.
Control

D.
Attack

Explanation:


Leave a Reply