Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing further control of a system is known as:
A) pivoting.
B) persistence.
C) active reconnaissance.
D) a backdoor.
Correct Answer:
Verified
Q450: A systems developer needs to provide machine-to-machine
Q451: A technician, who is managing a secure
Q452: An organization's research department uses workstations in
Q453: A security administrator is investigating a report
Q454: A network administrator is implementing multifactor authentication
Q456: A security analyst wishes to scan the
Q457: A company moved into a new building
Q458: A company network is currently under attack.
Q459: Which of the following is MOST likely
Q460: The president of a company that specializes
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents