Which action is an attacker taking when they attempt to gain root access on the victims system?
A . Privilege escalation
B . Command injections
C . Root kit
D . Command and control
Answer: A
Which action is an attacker taking when they attempt to gain root access on the victims system?
A . Privilege escalation
B . Command injections
C . Root kit
D . Command and control
Answer: A