cgillaspy6783 cgillaspy6783
  • 07-07-2020
  • Computers and Technology
contestada

Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing further control of a system is known as:

Respuesta :

azikennamdi
azikennamdi azikennamdi
  • 12-07-2020

Answer:

The right answer is Pivoting.

Explanation:

Penetration testers use pivoting as a technique to attack other systems having gained a foothold in one process within the same network. This allows them to circumnavigate firewall configurations, which may constitute restrictions and prohibit direct access to all other machines.

Cheers!

Answer Link

Otras preguntas

Which factor will have little effect on the solubility of saturated solutions? a. the temperature of the solvent b. the amount of extra time spent stirring th
R= 1+3w/2 solve for w
A gallon of stain can cover a square deck with an area 300 ft.² about how long is each side of the deck
-4/3x=8 please step by step
What would most likely happen if a person increased the amount of saturated fat in his or her diet?
Which is a variable expression for the word phrase? the product of 3 and a number decreased by 7 a. 3n + 7 b. 7 – 3n c. 3n – 7 d. 7n – 3
Solve the equation or formula for the indicated variable. a=21^3w, for w a. w=a/21^3 b. w=a/21 c. w=1^3/2a d. w= a/3-2
Why were cities essential to the growth of civilizations?
Four pairs of integers with the sum of five
All Sumerian cities built ziggurats the same size. a. True b. False