header bg

Question:

The third step in the ethical hacking methodology is which of the following?

A Gain access
Explaination