cgillaspy6783 cgillaspy6783
  • 07-07-2020
  • Computers and Technology
contestada

Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing further control of a system is known as:

Respuesta :

azikennamdi
azikennamdi azikennamdi
  • 12-07-2020

Answer:

The right answer is Pivoting.

Explanation:

Penetration testers use pivoting as a technique to attack other systems having gained a foothold in one process within the same network. This allows them to circumnavigate firewall configurations, which may constitute restrictions and prohibit direct access to all other machines.

Cheers!

Answer Link

Otras preguntas

Can someone help me with this problem and can you also show me the steps to get that answer
what are the roots of x2-3x+4
the baseballs come in a case of 18 if 60 cases were delivered how many baseballs are there in all?
If f(x) = x^2 - 4x + 3, and the domain is {-2, 0, 1}, what is the range? A) {7, 3, 0} B) {-9, 3, 1} C) {-1, 3, 1} D) {15, 3, 0}
correct answer will get brainlyiest.TY :)
A car repair shop charged $80 per hour for labor and $210 for the parts of a car. If the total cost of repair for the car was $490, how many hours did it take
43 is 7 less than triple a number
B. a student attaches a nozzle with an exit radius that is n times smaller than the faucet radius. 2b) let n = 3 i. how will this affect the flow rate? be speci
Mr. Parker has 982 pounds of grain. He feeds 240 pounds ro his pigs and 460 to his cows. How much grain does he have left
i want yall to salve these three