If a penetration tester has gained access to a network and then tries to move around inside the network to other resources, what procedure is the tester performing?
A. pivot
B. spinning
C. persistence
D. secondary exploitation
Answer: A
Computer Science & Information Technology
You might also like to view...
A two-variable data table returns ________ result(s) for each combination of two variables
A) one B) two C) three D) four
Computer Science & Information Technology
The ____ attribute provides descriptive text for an element.
A. class B. contextmeu C. dir D. title
Computer Science & Information Technology
In most organizations, the IT department receives fewer systems requests than it can actually handle.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The Background layer is located at the bottom of the stack.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology