What process does a penetration tester rely on to access an ever higher level of resources?
A. pivot
B. spinning
C. persistence
D. continuous exploitation
Answer: C
Computer Science & Information Technology
You might also like to view...
To create a fill for a shape created with merged lines, click the inside of the shape with the ____ Tool.
a. Paint Bucket b. Stroke c. Fill d. Color
Computer Science & Information Technology
How long do the permissions granted by the sudoers command last?
A. 15 minutes B. 30 minutes C. one hour D. two hours
Computer Science & Information Technology
A ________ is a program that defines how form data should be handled by a Web server
Fill in the blank(s) with correct word
Computer Science & Information Technology
Using the Windows 10 Pictures app, you can display photo albums from your OneDrive
Indicate whether the statement is true or false
Computer Science & Information Technology