Practice Test Geeks home

Certified Ethical Hacker Vulnerability Assessment and Exploitation 2

Which exploitation phase in CEH involves maintaining access to a compromised system for future use?

Select your answer