Which of the following is a tactic used by attackers, rather than a technique?
Gathering information about a target.
Establishing persistence with a scheduled task.
Using a phishing email to gain initial access.
Escalating privileges via UAC bypass.
I'm not sure about that