View all questions & answers for the GCIH exam
In which of the following malicious hacking steps does email tracking come under?
Reconnaissance
Gaining access
Maintaining Access
Scanning
Submit