During this step of the attacker methodology, the attacker might use rootkits and attempt to extract the passwords from the etc/passwd file or steal other passwords?
a. Scanning and enumeration
b. Gaining access
c. Escalation of privileges
d. Maintaining access
ANS: D
Computer Science & Information Technology
You might also like to view...
Which of the following file systems supports alternate data streams?
a. FAT32 b. HPFS c. Linux Ext4 d. NTFS 4.0
Computer Science & Information Technology
The ____ of an image grid can be expressed as dots per inch or pixels per inch.
A. color depth B. resolution C. density D. file size
Computer Science & Information Technology
If a remote wireless bridge is set to ____, it can only transmit to another bridge in root mode.
A. access point mode B. root mode C. nonroot mode D. repeater mode
Computer Science & Information Technology
Provide examples of when you would use the TRUE/FALSE options for the fourth argument in a VLOOKUP
What will be an ideal response?
Computer Science & Information Technology