PrincessCuCu1620 PrincessCuCu1620 26-08-2022 Social Studies contestada Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? a) reconnaissance b) enumeration c) maintain d) access e) gain access