in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)
in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)
Related questions
Question
in which phase or phases of a typical data exfiltration attack would a hacker be making use of phishing? ( choose all that apply)

Transcribed Image Text:A
B
с
D
U
U
Reconnaissance and characterization
Data gathering, clumping, masking, and aggregating
Installing and using covert command and control capabilities
Initial access
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps
