Certified Ethical Hacker v11 312-50v11 – Question154

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

A.
Scanning
B. Gaining access
C. Maintaining access
D. Reconnaissance

Correct Answer: B