CEH v13 defines the five phases of ethical hacking as a structured methodology that mirrors real-world attack progression:
Reconnaissance – Information gathering
Scanning – Identifying live hosts, ports, and vulnerabilities
Gaining Access – Exploiting vulnerabilities
Maintaining Access – Establishing persistence
Covering Tracks – Removing evidence
Option C matches this exact sequence. CEH v13 emphasizes that understanding this order is critical for both attackers and defenders, as it enables systematic testing and effective mitigation strategies.
All other options misplace phases and contradict the CEH methodology.
312-50v13 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"