List of questions
Related questions
Question 64 - PT0-003 discussion
During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?
A.
On-path
B.
Logic bomb
C.
Rootkit
D.
Buffer overflow
Your answer:
0 comments
Sorted by
Leave a comment first