During which step of the hacking process does the attacker attempt to force an application to perform actions running with a higher security context?

a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: D

Computer Science & Information Technology

You might also like to view...

To see what a document looks like on the Internet, you would use ________

A) Web Layout view B) Draft view C) Read Mode D) Notes view

Computer Science & Information Technology

What are some of the tasks you can accomplish with System Center Configuration Manager?

What will be an ideal response?

Computer Science & Information Technology