Question: Match the general attack strategy on the left with the appropriate description on the right. ( Each attack strategy may be used once, more than
Match the general attack strategy on the left with the appropriate description on the right. Each attack strategy may be used once, more than once, or not all.
Keyboard Instructions
Drag
Drop
Stealing information.
Current Value
Exploitation
pressdeletetoclear
Preparing a computer to perform additional tasks in the attack.
Current Value
Staging
pressdeletetoclear
Crashing systems.
Current Value
Exploitation
pressdeletetoclear
Gathering system hardware information.
Current Value
Reconnaissance
pressdeletetoclear
Penetrating system defenses to gain unauthorized access.
Current Value
Breaching
pressdeletetoclear
Configuring additional rights to do more than breach the system.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
