Answer:
The primary goal of automated post-exploitation activities is to maintain access, gather information, and perform actions on a compromised system after successful exploitation.
The primary goal of automated post-exploitation activities is to maintain access, gather information, and perform actions on a compromised system after successful exploitation.
You may be interested in:
Web Security MCQs