Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

In __________ phase the hacker exploits the network or system vulnerabilities.

a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access

Answer: d
Explanation: Penetration testers after scanning the system or network tries to exploit the flaw of the system or network in “gaining access” phase.

Join The Discussion