A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network.Which of the following is the MOST likely method used to gain access to the other host?

A. Backdoor
B. Pivoting
C. Persistance
D. Logic bomp


Answer; B. Pivoting

Computer Science & Information Technology

You might also like to view...

The ________ command moves charted data from the vertical axis to the horizontal axis and vice versa

Fill in the blank(s) with correct word

Computer Science & Information Technology

By default, all Ruby on Rails applications are configured to work with the SQLite database management system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the purpose of a baseline?

A. To provide the steps necessary to achieve security B. To assess the security state C. To provide all the detailed actions that personnel are required to follow D. To provide recommended actions to carry out under certain conditions

Computer Science & Information Technology

What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively??

A. 1.1.1.1? B. ?0.0.0.0 C. ?255.255.255.255 D. ?255.255.255.0

Computer Science & Information Technology