If a penetration tester has gained access to a network and then tries to move around inside the network to other resources, what procedure is the tester performing?

A. pivot
B. spinning
C. persistence
D. secondary exploitation


Answer: A

Computer Science & Information Technology

You might also like to view...

A two-variable data table returns ________ result(s) for each combination of two variables

A) one B) two C) three D) four

Computer Science & Information Technology

The ____ attribute provides descriptive text for an element.

A. class B. contextmeu C. dir D. title

Computer Science & Information Technology

In most organizations, the IT department receives fewer systems requests than it can actually handle.   

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Background layer is located at the bottom of the stack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology