Que: Which of these is not a step followed by cyber-criminals in data breaching?

a. Research and info-gathering
b. Attack the system
c. Fixing the bugs
d. Exfiltration
Answer: Fixing the bugs

Leave a Comment