Information Systems

In 150 words or more, answer the following. Watch the video and answer. https://www.linkedin.com/learning/ethical-hacking-introduction-to-ethical-hacking/stepping-through-the-hacking-phases?autoplay=true&u=57878161 Choose one of the five phases of ethical hacking. How would you attempt to counter your chosen phase? Explain why you would choose this method.