During which step of the hacking process does the attacker attempt to force an application to perform actions running with a higher security context?
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: D
Computer Science & Information Technology
You might also like to view...
To see what a document looks like on the Internet, you would use ________
A) Web Layout view B) Draft view C) Read Mode D) Notes view
Computer Science & Information Technology
What are some of the tasks you can accomplish with System Center Configuration Manager?
What will be an ideal response?
Computer Science & Information Technology