1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
3 years ago
10

Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt

her control of a system is known as:
Computers and Technology
1 answer:
Arada [10]3 years ago
4 0

Answer:

The right answer is Pivoting.

Explanation:

Penetration testers use pivoting as a technique to attack other systems having gained a foothold in one process within the same network. This allows them to circumnavigate firewall configurations, which may constitute restrictions and prohibit direct access to all other machines.

Cheers!

You might be interested in
Which of these is a preferred method for
Semmy [17]
B. Spreadsheets is the answer
3 0
3 years ago
Read 2 more answers
D is the correct answer
pogonyaev
For what Question ?
7 0
3 years ago
Read 2 more answers
your friend's parent's are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
Lorico [155]

Answer:

A possible expense that are not a need are entertainment.

I hope this helped!

4 0
3 years ago
What is computer system ?​
Over [174]

Answer:

a system that is a computer

6 0
3 years ago
Read 2 more answers
A typical broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your
Nikitich [7]

Answer:

Webcasts

Explanation:

The rest of the options don't need to be streamed as there isn't a continuous flow of information.

7 0
3 years ago
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • A porta power tool is what kind of tool
    9·1 answer
  • Software that instructs the computer how to run applications and controls the display/keyboard is know as the
    8·1 answer
  • What could be one rule to help your friend to blog safely
    6·2 answers
  • Name the functional arms of MSDE.
    13·1 answer
  • A solid understanding of __________ is the foundation of verbal communication
    7·1 answer
  • Select the correct answer.
    10·1 answer
  • Overview
    7·1 answer
  • Brain for free 12628397
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!