Ocasion6751 Ocasion6751 Today at 6:06 AM Computers and Technology Answered In the cyber attack lifecycle, What phase would be associated with an attacker adding a run key in the Windows registry? 1) Maintain presence 2) Internal Recon 3) Move laterally 4) Escalate privileges 5) Establish foothold