Que: In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?

a. Scanning
b. Maintaining access
c. Maintaining Access
d. Gaining access
Answer: Maintaining Access

Leave a Comment