During this step of the attacker methodology, the attacker might use rootkits and attempt to extract the passwords from the etc/passwd file or steal other passwords?

a. Scanning and enumeration
b. Gaining access
c. Escalation of privileges
d. Maintaining access

ANS: D

Computer Science & Information Technology

You might also like to view...

A SkyDrive folder URL begins with ________, to indicate that it is secure

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following employs a 160-bit hash?

A. MD5 B. SHA-1 C. SHA-2 D. NTLM

Computer Science & Information Technology