PdfPrep.com

According to attack lifecycle models, what is the attacker’s first step in compromising an organization?

According to attack lifecycle models, what is the attacker’s first step in compromising an organization?
A . Privilege Escalation
B . Exploitation
C . Initial Compromise
D . Reconnaissance

Answer: D

Exit mobile version