_______________ is not a step followed by cyber-criminals in data breaching

_______________ is not a step followed by cyber-criminals in data breaching

Q. _______________ is not a step followed by cyber-criminals in data breaching.

A.            Exfiltration

B.            Research and info-gathering

C.            Attack the system

D.            Fixing the bugs

Answer: Fixing the bugs

Scroll to Top