What process does a penetration tester rely on to access an ever higher level of resources?

A. pivot
B. spinning
C. persistence
D. continuous exploitation


Answer: C

Computer Science & Information Technology

You might also like to view...

To create a fill for a shape created with merged lines, click the inside of the shape with the ____ Tool.

a. Paint Bucket b. Stroke c. Fill d. Color

Computer Science & Information Technology

How long do the permissions granted by the sudoers command last?

A. 15 minutes B. 30 minutes C. one hour D. two hours

Computer Science & Information Technology

A ________ is a program that defines how form data should be handled by a Web server

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using the Windows 10 Pictures app, you can display photo albums from your OneDrive

Indicate whether the statement is true or false

Computer Science & Information Technology