cgillaspy6783 cgillaspy6783
  • 07-07-2020
  • Computers and Technology
contestada

Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing further control of a system is known as:

Respuesta :

azikennamdi
azikennamdi azikennamdi
  • 12-07-2020

Answer:

The right answer is Pivoting.

Explanation:

Penetration testers use pivoting as a technique to attack other systems having gained a foothold in one process within the same network. This allows them to circumnavigate firewall configurations, which may constitute restrictions and prohibit direct access to all other machines.

Cheers!

Answer Link

Otras preguntas

Which parenting style has been associated with children’s social behavioral competence and confidence
What’s the describe the direction
in the first session of a newly formed group the members assume self serving roles. which conclusion would the nurse make
the spectra of atoms reveals their _________.
the two regulatory systems in the human body are the __________.
How are the confederation and unitary forms of government different? The confederation system is a weak union between states, while the unitary system leaves al
Ava can swim 70 yards in 2 minutes. At this rate, how many yards would you expect her to swim in 5 minutes?
What did the 1921 Immigration Act do?
160 is divisible by which of the following numbers 2, 3, 4, 5, 6, 9, or 10
Who is a likely voter?