Q. _______________ is not a step followed by cyber-criminals in data breaching.
A. Exfiltration
B. Research and info-gathering
C. Attack the system
D. Fixing the bugs
Answer: Fixing the bugs
A. Exfiltration
B. Research and info-gathering
C. Attack the system
D. Fixing the bugs
Answer: Fixing the bugs