Certified Ethical Hacker Practice Test
Certified Ethical Hacker Vulnerability Assessment and Exploitation 2
Which exploitation phase in CEH involves maintaining access to a compromised system for future use?
Select your answer
A
Reconnaissance
B
Scanning
C
Gaining Access
D
Maintaining Access
Hint