Saved Bookmarks
| 1. |
What is the second stage in cyber attack? |
|
Answer» At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and GAIN a PERSISTENT foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to ACCESS the corporate infrastructure and downloaded more tools to access the environment.Explanation:I HOPE it helps youplease mark me brainlist |
|