In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
(a) Scanning
(b) Maintaining access
(c) Maintaining Access
(d) Gaining access
The question was posed to me in an online quiz.
My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,