Que: In __________ phase the hacker exploits the network or system vulnerabilities.

a. Scanning
b. Maintaining access
c. Reconnaissance
d. Gaining access
Answer: Gaining access

Leave a Comment