Prev Question
Next Question

The FIRST step in a successful attack to a system would be:

A.
gathering information.

B.
gaining access.

C.
denying services.

D.
evading detection.

Explanation:
Successful attacks start by gathering information about the target system. This is done in advance
so that the attacker gets to know the target systems and their vulnerabilities. All of the other choices
are based on the information gathered.

Prev Question
Next Question
Tagged:

Leave a Reply

Your email address will not be published. Required fields are marked *