Information Systems


In 150 words or more, answer the following.

Watch the video and answer.

https://www.linkedin.com/learning/ethical-hacking-introduction-to-ethical-hacking/stepping-through-the-hacking-phases?autoplay=true&u=57878161

Choose one of the five phases of ethical hacking. How would you attempt to counter your chosen phase? Explain why you would choose this method.