ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 111 - SY0-601 discussion

Report
Export

After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:

A.
privilege escalation
Answers
A.
privilege escalation
B.
footprinting
Answers
B.
footprinting
C.
persistence
Answers
C.
persistence
D.
pivoting.
Answers
D.
pivoting.
Suggested answer: D

Explanation:

The technique of gaining access to a dual-homed multifunction device and then gaining shell access on another networked asset is an example of pivoting. Reference: CompTIA Security+ Study Guide by Emmett Dulaney, Chapter 8: Application, Data, and Host Security, Enumeration and Penetration Testing

asked 02/10/2024
Jose M Rivera Vega
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first