Accessing an open wireless connection and exploiting vulnerabilities on a server are some of the activities that take place in the following step of the attacker's methodology

a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: C

Computer Science & Information Technology

You might also like to view...

A command that displays arrows to indicate what cells affect the value of the cell that is selected is the ________

A) Trace Precedents command B) Trace Dependents command C) Tracer command D) Trace Error command

Computer Science & Information Technology

Where is a host-based IDPS agent typically placed?

A. on a workstation or server B. at Internet gateways C. between remote users and internal network D. between two subnets

Computer Science & Information Technology