List of questions
Related questions
Question 111 - SY0-601 discussion
After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:
A.
privilege escalation
B.
footprinting
C.
persistence
D.
pivoting.
Your answer:
0 comments
Sorted by
Leave a comment first