in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)

icon
Related questions
Question

in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)

A
B
с
D
U
U
Reconnaissance and characterization
Data gathering, clumping, masking, and aggregating
Installing and using covert command and control capabilities
Initial access
Transcribed Image Text:A B с D U U Reconnaissance and characterization Data gathering, clumping, masking, and aggregating Installing and using covert command and control capabilities Initial access
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer