Skip to content

Certified Ethical Hacker v11 312-50v11

  • Certified Ethical Hacker v11 312-50v11

Tag: Question 154

Certified Ethical Hacker v11 312-50v11 – Question154

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

A.
Scanning
B. Gaining access
C. Maintaining access
D. Reconnaissance

Correct Answer: B

Tagged Certified Ethical Hacker v11 312-50v11, Question 154
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!