in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)
in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)
Related questions
Question
in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)
![A
B
с
D
U
U
Reconnaissance and characterization
Data gathering, clumping, masking, and aggregating
Installing and using covert command and control capabilities
Initial access](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2F256a3e86-81d2-4ed7-9f1e-b35d307732b4%2Fe25a6932-ed60-4e2e-a2a4-0ca70b959de3%2Fmqk81d_processed.png&w=3840&q=75)
Transcribed Image Text:A
B
с
D
U
U
Reconnaissance and characterization
Data gathering, clumping, masking, and aggregating
Installing and using covert command and control capabilities
Initial access
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)