Computer Science, asked by agaur8815, 1 month ago

What is the second stage in cyber attack?

Answers

Answered by itzinnocent56boy
2

Answer:

At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and gain a persistent foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to access the corporate infrastructure and downloaded more tools to access the environment.

Explanation:

I hope it helps you

please mark me brainlist

Answered by Anonymous
0

Answer:

At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and gain a persistent foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to access the corporate infrastructure and downloaded more tools to access the environment.

Explanation:

Plz mark as brainliest..

Similar questions