Based on the EBIOS Risk Manager (EBIOS RM) methodology, the attack sequence phases include various steps that an attacker might take to compromise an organization's assets. The four phases generally cover reconnaissance, exploiting vulnerabilities, achieving objectives, and maintaining persistence. "Exploiting" is specifically the phase where the attacker takes advantage of identified vulnerabilities in the system, which directly aligns with option A.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit