During this step of the attacker methodology, the attacker might use rootkits and attempt to extract the passwords from the etc/passwd file or steal other passwords?

a. Scanning and enumeration
b. Gaining access
c. Escalation of privileges
d. Maintaining access


ANS: D

Computer Science & Information Technology

You might also like to view...

Which of the following file systems supports alternate data streams?

a. FAT32 b. HPFS c. Linux Ext4 d. NTFS 4.0

Computer Science & Information Technology

The ____ of an image grid can be expressed as dots per inch or pixels per inch.

A. color depth B. resolution C. density D. file size

Computer Science & Information Technology

If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode.

A. access point mode B. root mode C. nonroot mode D. repeater mode

Computer Science & Information Technology

Provide examples of when you would use the TRUE/FALSE options for the fourth argument in a VLOOKUP

What will be an ideal response?

Computer Science & Information Technology