As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
4, 2, 5, 3, 1
2, 5, 3, 1, 4
4, 5, 2, 3, 1
4, 3, 5, 2, 1
Submit