Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?
A. Scanning
B. Gaining access
C. Maintaining access
D. Reconnaissance
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!