Back

Explore Courses Blog Tutorials Interview Questions
0 votes
2 views
in Cyber Security by (19k points)

a. Alliance

b. Reconnaissance

c. Weaponized

d. Exploitation

1 Answer

0 votes
by (19.9k points)
edited by

The correct answer is Exploitation. Exploitation is not a phase in Cybersecurity threat Intrusion.

It is a part of the threat to the computer system but it depends on the geographical area. When anyone tries to take advantage of a weakness in app or system that's called Exploit.

Want to learn cybersecurity? Enroll now in Cyber Security Training or check out these Cyber Security courses by Intellipaat.

Also, watch this video on Cyber Security:

Learn Cyber Security Course from this video:

Browse Categories

...