Accessing an open wireless connection and exploiting vulnerabilities on a server are some of the activities that take place in the following step of the attacker's methodology
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: C
Computer Science & Information Technology
You might also like to view...
A command that displays arrows to indicate what cells affect the value of the cell that is selected is the ________
A) Trace Precedents command B) Trace Dependents command C) Tracer command D) Trace Error command
Computer Science & Information Technology
Where is a host-based IDPS agent typically placed?
A. on a workstation or server B. at Internet gateways C. between remote users and internal network D. between two subnets
Computer Science & Information Technology