After gaining access to a dual-homed (i.e., wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset. This technique is an example of: A. privilege escalation. B. footprinting. C. persistence. D. pivoting. Correct Answer: D This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer