In __________ phase the hacker exploits the network or system vulnerabilities.
(a) Scanning
(b) Maintaining access
(c) Reconnaissance
(d) Gaining access
The question was posed to me in examination.
I would like to ask this question from Generic Steps for Security topic in section Cyber Security of Cyber Security