Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Which of the following comes after scanning phase in ethical hacking?

a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access

Answer: d
Explanation: Gaining access is the next step after scanning. Once the scanning tools are used to look for flaws in a system, it is the next phase where the ethical hackers or penetration testers have to technically gain access to a network or system.

Join The Discussion