After an attacker has probed a network for information, the next step is to ___________.
a. penetrate any defenses
b. paralyze networks and devices
c. circulate to other systems
d. modify security settings
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.