cgillaspy6783 cgillaspy6783
  • 07-07-2020
  • Computers and Technology
contestada

Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing further control of a system is known as:

Respuesta :

azikennamdi
azikennamdi azikennamdi
  • 12-07-2020

Answer:

The right answer is Pivoting.

Explanation:

Penetration testers use pivoting as a technique to attack other systems having gained a foothold in one process within the same network. This allows them to circumnavigate firewall configurations, which may constitute restrictions and prohibit direct access to all other machines.

Cheers!

Answer Link

Otras preguntas

which fraction has a value thats equal to 7/8? A) 49/64 B) 21/24 C) 15/8 D) 56/8
the suffix"-ose" indicated
What is 158% of 200?
jeremy has 18 marbles. he loses 6 of them. what fraction of marbles does he lose? what fraction of marbles does he have left
What was true of the differences between the North and South after 1820? a. The South's economy was turning from agriculture to manufacturing. b. The South wa
7.30 and 10% raise to the nearest cent
how can you find the area of a irregular polygon using area formulas
The cost of living protection rider is designed to help prevent inflation from eroding the purchasing power of the protection your policy provides. a. True b.
Three friends each have some ribbon Carol has 42 inches of ribbon Tino has 2.5 feet of ribbon in Baxter has them when 5 yards of ribbon express the joy lines of
which organ system contain the spinal cord list at least 4