During this step of the attacker methodology, the attacker might use rootkits and attempt to extract the passwords from the etc/passwd file or steal other passwords?
a. Scanning and enumeration
b. Gaining access
c. Escalation of privileges
d. Maintaining access
ANS: D
Computer Science & Information Technology