Posted by: Pdfprep
Post Date: November 3, 2020
After attackers gain access to a system, what method can they use to expand their access to other systems without exploiting vulnerabilities on other systems in the network?
A . change the network gateway address to the attacker’s command and control server
B . establish a Metasploit session to 127.0.0.1 and pass the user’s account hash to it
C . take advantage of domain trust to make connections to a partner network
D . block employees from visiting social media web sites on the company network
Answer: C
Leave a Reply