1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
4 years ago
10

Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt

her control of a system is known as:
Computers and Technology
1 answer:
Arada [10]4 years ago
4 0

Answer:

The right answer is Pivoting.

Explanation:

Penetration testers use pivoting as a technique to attack other systems having gained a foothold in one process within the same network. This allows them to circumnavigate firewall configurations, which may constitute restrictions and prohibit direct access to all other machines.

Cheers!

You might be interested in
An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
Flura [38]

Answer:

D. Operating system

Explanation:

A keyboard is a secondary item like a mouse and is not apart of computer hardware and app is also not a computer hardware because its coding not hardware. Web Browser is a Internet thing not hardware.

4 0
3 years ago
Read 2 more answers
7. What is the school campus’s setting<br> the school is sanford
Irina-Kira [14]
I think you mean stanford and the setting is lions?
8 0
3 years ago
Read 2 more answers
What is wrong with the following code?
Montano1993 [528]
Repost the picture there’s nothing here
8 0
2 years ago
A(n) _____ is money paid for work.<br><br> A. raise <br> B. allowance<br> C. wage<br> D. grant
Andreas93 [3]

Answer:

wage

Explanation:

3 0
3 years ago
Read 2 more answers
A company that manufactures machine parts order a new system that makes Products at ten times the speed of earlier machines. the
Semmy [17]
D i think hope this helps
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w
    10·1 answer
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • A ____ is a text document written in HTML.
    13·1 answer
  • 10. Question
    15·1 answer
  • Human factors is the study of:
    5·1 answer
  • Which of the following might an interior designer in the retail industry specialize in?
    9·1 answer
  • What creative commons license allow for the work to be copied, distributed, displayed, or performed but modifications may not be
    13·1 answer
  • 1. Which of the following cables are used in networking? Check all that apply.
    8·2 answers
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
  • Please help me asapppp!​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!