ethical-hacker video for in which of the following phases of APT lifecycle, an attacker enters the target network by spear phishing and places malware to
In which of the following phases of APT lifecycle, an attacker enters the target network by spear phishing and places malware to establish the unauthorized connection with the target system?