Que: Which of the following comes after scanning phase in ethical hacking?

a. Scanning
b. Maintaining access
c. Reconnaissance
d. Gaining access
Answer: Gaining access

Leave a Comment